Easily readable DNS is now a reality for Onions (so like agora.onion instead of agorahooawayyfoe.onion)

https://lists.torproject.org/pipermail/tor-dev/2015-July/009103.html

I registered example.tor and arma.example.tor, pointed example.tor at a HS that I was hosting on my laptop and arma.example.tor at Roger's hidden service (duskgytldkxiuqc6.onion) and uploaded the Record over a Tor circuit to a remote machine, Server A. I then manually transfered the JSON-encoded data structures from Server A to Server B, another machine. Then I launched the Tor Browser (with my binary substitution in place) so that all of the client-side programs were running. I entered "example.tor" into the Tor Browser and as expected arrived at my hidden service, and then typed arma.example.tor into the browser and as expected loaded duskgytldkxiuqc6.onion. This was a great test. The server-to-server communication needs a few bug fixes, but most of that code is in place. As soon as that is complete, I should be about ready for a beta test.


Comments


[3 Points] evilpumpkin:

Doesn't that mean you have to trust that the human-readable address points to the correct address?


[5 Points] honestlyimeanreally:

Foe, hoo awayy!

I like the URL.


[3 Points] loveletterreceiver:

I thought the onion urls were all about hashing power and how long you were willing to wait?