Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #15748

Closed
Open
Created Apr 21, 2015 by Trac@tracbot

feature request for discussion

thanks for the hard work. I got a few questions that may or may not turn into viable features. for your consideration... pls bear with me if this is in the wrong section

  1. if the is so much interception of internet traffic worldwide, is it not more practical to make obfsproxy a default startup setting to reduce the potential amount of attention from spying idiots

  2. with the growing anti-NSA sentiment, has tor though about approving at least one geoip plugin like WORLDIP, so folk who are super weary can see where at website is located and if need be block an entire country if they feel their privacy is at threat

  3. with tors infrastructure pretty well established, there is still no way to verify that when you visit tor it is not a NSA dummy site. Is it possible to implement a verification site that sits as a hidden service that holds some kind of session key, giving lets say the tor site a ring-of-three auth model. so when a client visits tor, it has to fetch an session key from a hidden service, so that the NSA's clever faster-than-light tactic can be circumvented.

Trac:
Username: tada

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking