-
Notifications
You must be signed in to change notification settings - Fork 774
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TOR config #149
Comments
Thanks for the suggestion. We need to investigate this further. This could potentially happen in two different places:
|
Thank you for the consideration! I will keep brainstorming a good way to implement option 2 but for now i'm pretty stumped on a good way to implement this. Option 1 does not seem like it would take as much trouble though |
👋🏼 @fortuna! |
You would also need to warn the users about the risks such as attacks by malicious exit nodes and Tor user discrimination by various websites. |
@fortuna 1 would expose the Outline server to plaintext Tor traffic, while we generally try to limit sensitive data that may be stored on the Outline servers. |
@YegorIevlev Outline could have a dedicated TOR entry node which it would not need to expose the Outline server to plaintext to enter the TOR network. |
@MaXFalstein Even simpler, do Tor proxying completely on client side. |
There may be cases where people need to be anonymous using tor there should be a config in outline server that will allow a user to run traffic through a tor server
The text was updated successfully, but these errors were encountered: