On 10/29/2013 08:48 AM, Manfred Ackermann wrote: > Hi List. > > Sorry to push this up, just wondering if this approach is such stupid that > it's not even worth leaving a related comment to it ;-) Or is it just of no > interest? > > Any comments apriciated.
Hello Manfred, Sounds like a fantastic idea. But I think I'm missing something that I'm hoping you can clear me up on. How does this protect the user if the first-in-line server is compromised? So the user connects to HS on computer1 which is compromised. How does your system stop them from being compromised instead of forwarded deeper into the network to computer2? Cheers, Anthony -- Anthony Papillion XMPP/Jabber: [email protected] OTR Fingerprint: 1515393D53BA593C19E2CD549AE59FB650F82ABC SIP: [email protected] PGP Key: 0xDC89FF2E -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
