[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Sks-devel] sks hiddden service
From: |
address@hidden |
Subject: |
Re: [Sks-devel] sks hiddden service |
Date: |
Tue, 28 Apr 2015 11:15:02 +0200 |
User-agent: |
wk3.org |
On Tue, 28 Apr 2015 10:49:30 +0200 (CEST)
Gabor Kiss <address@hidden> wrote:
> > > Did you know abput some official sks hidden service i could add to my
> > > membership file?
> >
> > There is:
> > t3iqlf4oumhz2zg3.onion 11370
> >
> > And that one is exactly the same as:
> > keys.techwolf12.nl 11370
>
> What is the use of starting a hidden service if the server
> otherwise is totally public and well known? :-o
Reasons are twofold:
1) You get TLS encryption and verification for free.
2) You enable other servers who want to stay anonymous to stay completely
within the Tor network (and also not accidentally not use it).
the same (maybe even more importantly) is true for 11371 and your users.
I put my hidden service as keyserver into my ~/.gnupg/gpg.conf (alongside
keyserver-options no-honor-keyserver-url) and made bash aliases bla1='torify
gpg', bla2='torify gpg --search' and bla3='torify gpg --recv-keys'.
Sincerely,
Malte