Next-generation hidden services protocol(aka v3 onion services). Tor 0.3.2.2-alpha !!!!!

The cryptographic building blocks use updated or more secure signature algorithms and hashing methods. For instance, the older SHA1/DH/RSA1024 was swapped with SHA3/ed25519/curve25519. Directory protocol has been improved and now leaks less metadata to directory servers. This is, in part, to avoid attacks where a hidden service can be censored easily based on the descriptor. To prevent predictability Tor uses, different, pseudo random variables. Time period, public keys, shared random values, etc. "Better onion address security against impersonation; more extensible introduction/rendezvous protocol; and a cleaner and more modular codebase." As time goes on and more users test v3 onion services, additional prop224 features will likely make their way to Tor and the Tor Browser. They announced that, in the future, some of the next updates will include advanced client authorization and improved guard algorithms.


Comments


[6 Points] GuapoGotThemBarz:

So.. a new, more secure Tor browser?


[1 Points] None:

tcp to ip 12 bit