XPost: alt.privacy.anon-server, sci.crypt   
   From: soul.patch@127.0.0.1   
      
   On Fri, 12 Sep 2025 22:50:17 +0200   
   Gabx wrote:   
      
   > Soul Patch wrote:   
   > > On Fri, 12 Sep 2025 15:53:53 +0200   
   > > Gabx wrote:   
   > >   
   > >> I don't like talking to people who can't do anything with their lives   
   > >> other than criticize those who work hard and put themselves out there.   
   > >   
   > > This seems to be the main purpose of the Internet ;) If you are trying to   
   accomplish something or build something the troll zombies are there to bust   
   your kneecaps and kick you while you're down.   
   >   
   > The important thing is to stay focused on your goals.   
      
   No argument there. Grab on like a bulldog that won't let go.   
      
   > I feel technically vulnerable, always.   
   > I have to stay humble and learn, that's my philosophy.   
   >   
   > I also think we can learn from trolls.   
   > I'm also for always replying to every post, everyone deserves   
   > communication.   
      
   Until they don't.   
      
   > But I'm not here on this planet to be an example.   
   >   
   > It's nice to argue the point of saying "fuck you" to certain idiots.   
      
   I prefer to kill them with kindness. If that doesn't work I use killfile   
   filters.   
      
   > > Anyway, I'm trying to figure out the best way to run INN news server   
   totally hidden behind TOR so it can be peered behind TOR encrypted tunnels and   
   hidden services.   
   > If I understand correctly, you don't just want your server to be   
   > reachable by onion address from Usenet clients, but you want it also   
   > accessible to peers using its onion address.   
      
   Yes, it must be 100% TOR addressable only with no clearnet connections.   
      
   > That seems impossible to me, actually.   
   > Unless your peers are using Tor themselves.   
      
   It does seem impossible but it is just really hard and convoluted. I've done   
   routing like this long ago in the past with other networked programs. And you   
   are right that the other peers must also use TOR. That is the point--a NNTP   
   network with all peers    
   hidden behind TOR and no clearnet exits (ideally).   
      
   > Something like this i think:   
   >   
   > > torsocks innfeed   
      
   Torsocks is insecure and can leak data. It only uses ENV variables which can   
   be disregarded by bad software and scripts, especially anything that is   
   statically compiled. Onionix is better, but does serve the bidirectional port   
   path problem, and doesn't    
   live in Debian repositories which is a deal-breaker since it would force users   
   to be programmers and compile stuff, the very kind of thing I want to avoid.   
   I'm trying to lower the bar to entry rather than raise it.   
      
   --   
   Soul Patch   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|