Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Isn't one of the main points of Tor that other than by knowing that an IP is an exit node, no one is able to tell you're using it? And .onion resolution is entirely client side, no?


The ISP can see your traffic going towards entry nodes if I'm not mistaken.


TLDR: You can use pluggable transports.

It's super difficult to build a low latency mix-net that covertly works inside an adversarial network.

In addition to the current models over which onion/garlic routing are based upon you would (at least) need to add to the core of your software traffic obfuscation, a series of covert channels, NAT bypass, ...

Tor and other mix networks simplify the problem assuming that there's a portion of the Internet that is free and introducing censorship circumvention mechanisms.

Of course, the assumption is increasingly untrue.


Perhaps we could crowdfund Tor node satellites?


Random thoughts: high latency, costs, vulnerability to spoofing and jamming, distribution of ODUs/IDUs, trust in the owner/manager of the link


What about (maybe) lasers + LEO, basically what Musk does?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: