On Wed, May 30, 2012 at 9:07 AM, Fabio Pietrosanti (naif) <li...@infosecurity.ch> wrote: > So basically "on top of Tor software and Tor Infrastructure" it would be > possible to build other kind of networks, given that they participate to > the Tor network itself.
And the directory authorities could freely attack such usage at will. They're trusted to document tor nodes— but why would you trust them to publish other data? _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk