I am not sure neither to understand the interest of the system. Why should it be better than systems such as Namecoin?
Why this (umpteenth) concept of discussing using hidden services (unlikely to be usable by normal people) on a small network like Tor? How do you prevent name squatting/spoofing? Maybe missing something but interested by the problematic, currently working on https://github.com/Ayms/node-Tor#convergence Le 24/02/2016 00:22, Allen a écrit : >> >> Secondly, with the requirement that nickn...@sitename.tld to be unique, >> I could write that nickname on a business card and hand it out. People >> could verify at a verification service that there is only one >> certificate (and public key) for that name and be sure to have gotten >> *my* public key. From that point, they can send encrypted messages to me. >> > > That's not a service that I would use myself. If I wanted people to be > able to get my public key from a business card, I would print the key > itself on my card using a QR code. The other stuff you listed also don't > have much interest to me personally, but I can't speak for anyone else. > -- Get the torrent dynamic blocklist: http://peersm.com/getblocklist Check the 10 M passwords list: http://peersm.com/findmyass Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org Peersm : http://www.peersm.com torrent-live: https://github.com/Ayms/torrent-live node-Tor : https://www.github.com/Ayms/node-Tor GitHub : https://www.github.com/Ayms -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk