prop279 discussion

Tor will intercept the SOCKS request, and use the

  • executable at /usr/local/bin/unicorn to query the unicorn name system
  • for elephantforum.corn. Tor communicates with the unicorn plugin
  • using the Tor NS API through which name queries and their results can
  • be transported using stdin/stdout.

Bad: logs can store timing information, which can be used to link network accesses patterns to a specific PC. It's better to have a daemon and local encrypted authenticated REST API to resolve names.