-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Somebody pointed to me "Using Tor as a library" https://lists.torproject.org/pipermail/tor-dev/2013-March/004564.html.
I am thinking about writing a proxy service to install in your local machine to be able to access TOR Hidden Services without having to install the full TOR in your machine. Client anonimity here is not an issue, but being able to access to "onion" hidden services easily and faster than providing mutual anonimity.
All documentation I see describes the hidden services from a high level view, but I would like to be able to connect to them without involving TOR. And without reading TOR sourcecode :-)
Is this current? https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=rend-spec.txt
The client needing to open her own rendezvous incoming port is a problem :). What if the client doesn't need anonimity?.
Any suggestion? Is the recomended/only way, to simply compile as library and call "tor_main()"?. No other choice?.
Thanks!
- -- Jesús Cea Avión _/_/ _/_/_/ _/_/_/ jcea@jcea.es - http://www.jcea.es/ _/_/ _/_/ _/_/ _/_/ _/_/ Twitter: @jcea _/_/ _/_/ _/_/_/_/_/ jabber / xmpp:jcea@jabber.org _/_/ _/_/ _/_/ _/_/ _/_/ "Things are not so easy" _/_/ _/_/ _/_/ _/_/ _/_/ _/_/ "My name is Dump, Core Dump" _/_/_/ _/_/_/ _/_/ _/_/ "El amor es poner tu felicidad en la felicidad de otro" - Leibniz
Rather than going through a large process to reach hidden services without the Tor bundle, I'd suggest instead using Tor2Web or Onion.to. Tor2Web is also open-source, but both are fairly reliable.
Example: DuckDuckGo Tor only: http://3g2upl4pq6kufc4m.onion http://3g2upl4pq6kufc4m.tor2web.org http://3g2upl4pq6kufc4m.onion.to
best, Griffin