LTRavioli on Nostr: Nice idea, and name. I am not very knowledgeable on the topic. But here are some ...
Nice idea, and name.
I am not very knowledgeable on the topic. But here are some questions:
How would a user find a list of possible renoters to use?
If I remember right, in TOR it is some kind of centralized list, correct?
At least for the guard nodes and exit nodes.
Would we have to differentiate between guard nodes and exit nodes as well in this case?
I.e.: the first node in the chain has the IP of the user. As such it is more important that this node is secure/safe to use than some nodes in the middle of the chain.
I am not very knowledgeable on the topic. But here are some questions:
How would a user find a list of possible renoters to use?
If I remember right, in TOR it is some kind of centralized list, correct?
At least for the guard nodes and exit nodes.
Would we have to differentiate between guard nodes and exit nodes as well in this case?
I.e.: the first node in the chain has the IP of the user. As such it is more important that this node is secure/safe to use than some nodes in the middle of the chain.