tor-gpg
M. Spruell
mspruell at gmail.com
Wed Sep 27 01:51:39 UTC 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Howdy all,
Freenode has put into place an accountability system for tor users.
Yes, it is still 'anonymous'.
Here are the steps:
1: Generate a GPG key. This can be completely anonymous, without ANY
personal info at all, if you like. It can be linked to you and not
uploaded anywhere, or just a totally anonymous key. It doesn't matter.
2: Email staff at freenode.net a signed (with your GPG key from step 1)
password hash generated by (on freenode) /quote makepass $string or (in
a *nix console) mkpasswd -H md5
**** If anyone needs to know, the public GPG key for staff at freenode.net
**** is 0x035D6B1D
Upon receipt of the above, the user will receive in return email
instructions on how to connect.
Users of this system will have complete freedom of the network, as they
will be given a static ID based on their GPG key they send in. This
means they can be held accountable for their actions, as their hostmask
will never change.
Here is an example: user at gateway/tor-gpg/0xKEYID
If you know any tor users who are currently using other methods of
gaining access to #ubuntu (+e, cloak, etc) then perhaps this is for them.
If you have any questions, feel free to ask them.
Marek
nalioth on Freenode.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFGdkryz6+0fDuDXwRAv6JAKCpjLPHj2MGb6NZ1SycQ0hXroCCGgCfR63N
p4MTsRV4px7wpMBGgEPV7A8=
=7+tL
-----END PGP SIGNATURE-----
More information about the Ubuntu-irc
mailing list