Difference between revisions of "Session:Tor Services using GNS"

From Camp_2015_Wiki
Jump to: navigation, search
m
m
Line 2: Line 2:
 
|Has session tag=crypto, surveillance,
 
|Has session tag=crypto, surveillance,
 
|Is for kids=No
 
|Is for kids=No
|Has description=Invited guests: …?
+
|Has description=So the Tor Hidden services DHT is prone to plenty of attacks. Some Tor developers have begun integrating the GNU Name System as an alternative hidden service strategy. How's progress? How do concepts like Web of Trust and Social Graph play into this? We had long discussions on the Tor mailing lists that we should continue in person.
 
 
So the Tor Hidden services DHT is prone to plenty of attacks. Some Tor developers have begun integrating the GNU Name System
 
as an alternative hidden service strategy. How's progress?
 
How do concepts like Web of Trust and Social Graph
 
play into this? We had [https://lists.torproject.org/pipermail/tor-talk/2015-January/036512.html long discussions] on the Tor mailing lists that we should continue in person.
 
 
|Has website=https://gnunet.org/gns
 
|Has website=https://gnunet.org/gns
 
|Has session type=Hands-On
 
|Has session type=Hands-On

Revision as of 17:01, 16 July 2015

Description So the Tor Hidden services DHT is prone to plenty of attacks. Some Tor developers have begun integrating the GNU Name System as an alternative hidden service strategy. How's progress? How do concepts like Web of Trust and Social Graph play into this? We had long discussions on the Tor mailing lists that we should continue in person.
Website(s) https://gnunet.org/gns
Type Hands-On
Kids session No
Keyword(s) political, software
Tags crypto, surveillance
Processing village Village:Youbroketheinternet
Person organizing User:LynX
Language en - English
en - English
Related to Projects:We'll Make Us A Gnu One
Other sessions... ... further results

Starts at
Ends at TBD
Duration TBD
Location Village:La Quadrature du Camp

Invited guests: …?

So the Tor Hidden services DHT is prone to plenty of attacks. Some Tor developers have begun integrating the GNU Name System as an alternative hidden service strategy. How's progress? How do concepts like Web of Trust and Social Graph play into this? We had long discussions on the Tor mailing lists that we should continue in person.