-
-
Notifications
You must be signed in to change notification settings - Fork 177
Proxy trough static URL (es: http://x.tor2web.org) #34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I do not thing that:
I see as the only valuable element that we can make cheaper/simpler to run a tor2web node:
|
I believe this feature is of utmost importance. Without such a feature a user of tor2web.org has no way of avoiding that the site they are visiting is leaked in plaintext. |
Moreover this feature may be of interest to people that wish to deploy tor2web as an "add on" to their website. For example somebody may wish to host a tor2web instance under a special path on their website: i.e: I think the issue of cookie stealing and XSS, I believe are secondary as MITM on SSL is of much greater effort than DNS based sniffing. |
Issue:
descriptive solution:
Feature description:
when "x." subdomain is connected, all the parameters expected via GET and the destination host, are expected via POST
security and scalability
The text was updated successfully, but these errors were encountered: