-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 4/21/14, Fabio Pietrosanti (naif) lists@infosecurity.ch wrote:
Hi all,
does anyone know of any work to make a Python Only Tor Client, that just enable to expose a Tor Hidden Service?
It would be very cool if it would be possible to avoid "Tor binary" as a dependency for Globaleaks, making it pure Python application code.
The questions are:
Are there projects that foresee to do something like that?
From a Tor Project perspective, does it make sense?
From a Security perspective, are there strong security implications in
doing so?
I have been considering such a project, though my purpose for pursuing it would be to both learn Python and to come to a better understanding of the internals of Tor. Perhaps not the best circumstances for a solid implementation...
For the time being my implementation is just going to be an experiment with trying to speak the Tor protocol, but assuming that I can get some of the basic building-blocks working I'll be pursuing a Tor rewrite in my spare time (I'm currently a student, and as such still sorting out my schedule). I'll probably be in and out of IRC and these mailing lists asking questions every now and again (and trying not to ask stupid ones).
- - ajtgarber (0xEFDA75F9) A190 2527 2D58 6A2B 8108 CB66 D57A A16A EFDA 75F9