Hacker News new | past | comments | ask | show | jobs | submit login

Slightly disagree, Tor hidden services are fantastic to implement decentral signal/rendevous services with no single point of failure. I'm using this in my app https://cryonet.io

Love the fact that it works in many places where plain UDP solutions fail.

Once two nodes are connected via a Tor hidden service, other p2p channels can be established and are more appropriate to transfere large files.




> Once two nodes are connected via a Tor hidden service, other p2p channels can be established and are more appropriate to transfere large files.

While maybe not in your concrete case, in general this sounds like really dangerous advice - a quick way to open up for deanomyizing attacks?

Hey node behind Tor, send me your IP by requesting this https resource outside of Tor... Etc ?


Yes that is true, I should have mentioned that, this is only a privacy preserving / encrypted mechanism for signalling without a central server, peers are expected to know and trust each other, like family and friends scenario.


The Cryo tool really should be open source. Closed source binaries should not interact with Tor. You are hinting that it leaks the IP over the Tor channel -- the behavior needs to be easily verifiable to the user, and the source should be available so folks can fix privacy or security bugs which can put your users at risk.

None of this precludes the sale of your $20 lifetime license; but you are probably better off selling some kind of support license or other intangible thing and liberate the code.


I'm not planning to open source the complete tool, after all I have a hard time to find similar open source projects which earn enough money (would love to be proven wrong here).

But I fully agree that the security and network stuff needs to be open sourced to be verifiable. My plan is to release the related sources together with the protocol specifications, need to refactor a few things first but this will happen.


There is already a P2P program called OnionShare that uses the TOR network. Never used it, but journalists and activists supposedly use it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: