-
Notifications
You must be signed in to change notification settings - Fork 262
Description
Is your feature request related to a problem? Please describe.
tor-hidden services are too easy to attack for state-level actors
(i am not sharing concrete examples)
nym-hidden services could provide better security
Where does the feature fit in the Nym real estate?
core protocol
What is this solving?
currently nym is a "client only" tool
it is not possible to hide servers behind nym
Describe alternatives you've considered
tor-hidden services
Additional context
https://forum.nym.com/t/better-client-and-server-network-level-privacy-edited/1210/3
Hidden Services – We’re not currently planning to support hidden services, but that could change in the future.
i guess this has not changed
i guess helping "others" to run hidden services
can cause pressure from state-level actors
(session, signal, telegram, encrochat, ghost, VPN services, ...)
especially for a commercial service like nym
compared to non-commercial services like tor
technically, this should be trivial to implement
mostly copy-paste tor-hidden services
(rendezvous point negotiation, DHT, ...)
related:
edit:
some of nym's advantages are already implemented in tor:
nym cover traffic = tor padding (implemented)
nym packet shuffling = tor muffler (pdf) (not implemented)