[tor-dev] Using Tor Stealth HS with a home automation server
bancfc at openmailbox.org
bancfc at openmailbox.org
Sat Jul 9 13:56:27 UTC 2016
On 2016-07-09 15:39, Nathan Freitas wrote:
> On Fri, Jul 8, 2016, at 10:38 PM, bancfc at openmailbox.org wrote:
>> On 2016-07-08 18:53, Nathan Freitas wrote:
>> > I've been working on some ideas about using Tor to secure "internet of
>> > things", smart devices other than phones, and other home / industrial
>> > automation infrastructure. Specifically, I think this could be a huge
>> > application for Tor Hidden Services and Onion sites configured with
>> > Hidden Service Authentication and "stealth" mode.
>> >
>> > Earlier this year, I published some ideas on the subject here
>> > https://github.com/n8fr8/talks/blob/master/onion_things/Internet%20of%20Onion%20Things.pdf
>> > showing how you could use Orbot and IP Camera apps to build a
>> > cloud-free
>> > Tor-secured "Dropcam" style setup.
>> >
>>
>> Nice! An interesting Orbot feature to have is making QR Codes of
>> authenticated Hidden Service info so mobile devices can easily add
>> each
>> other to a trusted network.
>
> That is a great idea. I am thinking of writing a module for the Home
> Assistant platform that would handle the tor install and setup, and it
> could autogenerate this QRcode as well.
>
> Any thoughts on a format? torhs://clientname:authcookie@foo.onion looks
> decent.
Yes this looks good but I think changing the URI to tor:// should be
enough since there aren't different types of Tor only locations?
More information about the tor-dev
mailing list