This is pretty interesting stuff keybase is doing with Tor...
http://fncuwbiisyh6ak3i.onion/docs/command_line/tor
I wonder if there's not a much wider applicability to this sort of layered-security model in the context of network events that need to be able to take place surreptitiously in a hostile LAN/WAN context...
Good stuff.
Cheers,
~ pj
keybase's leverage of Tor routing mechanisms
- Pattern_Juggled
- Posts: 612
- Joined: Sun Dec 16, 2012 6:34 am
- Contact:
keybase's leverage of Tor routing mechanisms
...just a scatterbrained network topologist & crypto systems architect……… ҉҉҉
[list]
[/list]
☯ pj@ðëëþ.be ☯ keybase pgp ☯ mit pgp ☯ ðørkßöt-on-console ☯ git 'er github
bitmessage: BM-NBBqTcefbdgjCyQpAKFGKw9udBZzDr7f[/color]
[list]
☯ pj@ðëëþ.be ☯ keybase pgp ☯ mit pgp ☯ ðørkßöt-on-console ☯ git 'er github
bitmessage: BM-NBBqTcefbdgjCyQpAKFGKw9udBZzDr7f[/color]