On 5/30/12 3:18 PM, Gregory Maxwell wrote: > On Wed, May 30, 2012 at 9:07 AM, Fabio Pietrosanti (naif) > <li...@infosecurity.ch> wrote: >> So basically "on top of Tor software and Tor Infrastructure" it would be >> possible to build other kind of networks, given that they participate to >> the Tor network itself. > > And the directory authorities could freely attack such usage at will. > > They're trusted to document tor nodes— but why would you trust them to > publish other data?
That's exactly my proposed concept: - They will publish tor data only for real tor-relay acting as tor-relay It would just be that "those kind of information" would also be used by other software that for it's usage depends on Tor. So it would not hurt in any way the tor network but rather instead would benefit the tor network, increasing the number of Tor relays. For sure anyone using a software that use that method need to ask himself: * Can i trust Tor infrastructure, community and directory authority? If the answer is "yes" then it would be a win-win condition for Tor and for software using it (running a Tor Relay). -naif _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk