[tor-onions] Automatic "Onionification" of existing websites
Tim Wilson-Brown - teor
teor2345 at gmail.com
Sun Jan 31 17:31:58 UTC 2016
> On 31 Jan 2016, at 21:17, Fabio Pietrosanti (naif) - lists <lists at infosecurity.ch> wrote:
>
> I'm just firing the discussion, but if we want thousands of onion sites,
> then we need to facilitate the deployment on the existing configured
> websites, without requiring a sysadmin to do a lot of hackish stuff.
Cryptographic verification would be good here too, otherwise people can set up fake .onion sites and harvest credentials.
But I think that's a bigger issue with no easy solution at this point.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20160201/38e420b4/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20160201/38e420b4/attachment.sig>
More information about the tor-onions
mailing list