From 26C3 Public Wiki
OnionCat
OnionCat is a VPN service based on Tor and/or I2P. Thus it creates bi-directional anonymity in respect to technical location specifiers, like IP addresses. It is completely protocol transparent which means that it carries IP packets directly.Last year we did a presentation about this project at the 25C3.
We are again going to be present at this year's congress. We'd like to...
- talk together with you about our ideas.
- give you support in installing and using OnionCat.
- help you setting up services for other users.
Contents |
What OnionCat is good for
With OC you can create IP connections through Tor or I2P to other OC users and send any IP data across that virtual connections that you like...as you can do with the regular Internet. Every end point of those virtual connections are identified by an IPv6 address. This address is unique to one end point which means they are unique to a specific node (user, computer, host, server,...). But they are location independent and untraceable due to the nature of these anonymization networks.
News
- We arrived today...yeah! After waiting about 2 hours in the queue at the cash desk we got our entrance tickets (the longest queue ever seen at this convention...). See ya tomorrow in the hack center down under ;) Rahra 23:03, 26 December 2009 (CET)
- Did a short introductory lightning talk about Garlicat. Slides are found here. Rahra 14:15, 30 December 2009 (CET)
Further Information
If you are interested come to our desk. Have a lookout for a cat's paw which is our logo. Contact me (Rahra) or have a look at the OnionCat Project Page.
As usual, many people from other projects will also be there, but specifically devs from I2P (see I2P) and Tor will also be here.
Who is there?
Where?
We got a desk somewhere in the middle of the hack center together with the I2P guys. We stick a hand-crafted sign saying "OnionCat" to a pole of the building....we are not sitting there anymore *g*
Contact me using personal email or our mailing list ocat-talk(-subscribe)@cypherpunk.at, if it is a general question.
Testable GarliCat Destinations
IPv6 address:
fd60:db4d:ddb5:d50d:38fe:5eac:5f4f:e88b
Truncated hostname:
2ugtr7s6vrpu72el.oc.b32.i2p
I2P destination:
9nizpqw~sQR-eW4sz1~hQqQMwN08j0NRLiV9aAAs~kFXSoUIaFKnyeUve7C2~VgU10lR4du4ol1JVIqf0tCdUv73pZaBd-gzXxrv51ZThSIM~aH8AIX3spJ8YhHs-Eb8XNrVs7d7ebrV9DLMEHS45m7BnpstNQlclXoxdHDGF~h4Qoa0ERVEU4qNz0Z99p3j7DR1P~DWtHHa~VEtCGI2xeZgwj83AXJSiEAlv5WTlxIfpdHbxyFbpkzGC3c-mJq4QCoJZZcML4iKO2iLJ2QT3zA9D8MnI3PFkpenTzyhUYnzadp~3ttnGhhhkE9GYxUwjnxGQsFUz-oBZvSs0cDCTY6VvKG5eKuc6Zj3PlFyEC7AOq3rjTSqD5aQhQfaQr-m4tww2FhLwq2ydNe~cL2OgyCk-m4L3VvsUoqGXpHH0i7AeG2NXyFZJZGkFXollCg7yqO~jPdAJO0vt8XOnqVzPliPe-~ZviQttuPS~5j~HuYx8L2U4j4ApM39PVWKYrWkAAAA