Presented at
32C3 (2015),
Dec. 29, 2015, 12:45 p.m.
(60 minutes).
We'll update you on what's going on with Tor onion services, aka Tor hidden services.
In the past, onion services were mostly run by people who wanted to set up a website that somebody else wanted to shut down. Increasingly, people are recognizing that onion services are much more broadly useful: they are about providing more security to users, not hiding websites.
Over the last year or so, Facebook set up an onion service to let their users reach Facebook more securely, the IETF officially designated '.onion' as a reserved domain, we've been talking to the "Let's Encrypt" folks about giving an onion address to every website, some neat new apps are coming out that use onion services (like decentralized chat), and more.
We also have some actual stats on hidden services:
https://blog.torproject.org/blog/some-statistics-about-onions
At the same time, we've been working on next-generation onion services. We'll explain why they greatly improve both security and scalability.
Presenters:
Links:
Similar Presentations: