Talk:Onion routing: Difference between revisions
DeathByNukes (talk | contribs) →"Decoy Ciphers" Section: new section |
→Rewrite: new section |
||
Line 71: | Line 71: | ||
The [https://secure.wikimedia.org/wikipedia/en/enwiki/w/index.php?title=Onion_routing&oldid=419536476#Decoy_Cyphers Decoy Ciphers] section appears to have been copy pasted directly from [[Null cipher]], and makes absolutely no sense in this context. --[[User:DeathByNukes|DBN]] ([[User talk:DeathByNukes|talk]]) 05:15, 2 April 2011 (UTC) |
The [https://secure.wikimedia.org/wikipedia/en/enwiki/w/index.php?title=Onion_routing&oldid=419536476#Decoy_Cyphers Decoy Ciphers] section appears to have been copy pasted directly from [[Null cipher]], and makes absolutely no sense in this context. --[[User:DeathByNukes|DBN]] ([[User talk:DeathByNukes|talk]]) 05:15, 2 April 2011 (UTC) |
||
== Rewrite == |
|||
Just finished [https://en.wikipedia.org/enwiki/w/index.php?title=Onion_routing&diff=638316128&oldid=638282070 a pretty substantial overhaul] of the article. Edit summaries along the way mark some thoughts/questions. Feedback/improvements invited. |
|||
The biggest thing I feel like I left hanging is what to do about the material over at [[Tor (anonymity network)|the Tor article]] that applies here (and would probably make more sense in this article if the sources weren't all about that specific implementation of onion routing and if that article weren't exponentially more prominent/important than this one). Specifically I'm looking at the Weaknesses section. I didn't expand the current section too far beyond what existed previously (condensed those into two, reworded, and elaborated), but there are many more at the Tor article... --— <tt>[[User:Rhododendrites|<span style="font-size:90%;letter-spacing:1px;text-shadow:0px -1px 0px Indigo;">Rhododendrites</span>]] <sup style="font-size:80%;">[[User_talk:Rhododendrites|talk]]</sup></tt> \\ 05:35, 16 December 2014 (UTC) |
Revision as of 05:35, 16 December 2014
Computing C‑class Mid‑importance | ||||||||||
|
Vandal attack
Anybody know why this page has been getting a DDOS vandal attack? —Ben Brockert (42) UE News 09:00, May 22, 2005 (UTC)
- It's linked from a new Slashdot article. adamsan 09:08, 22 May 2005 (UTC)
- Ah. Why do they always use the same image? I thought the slashdotters were usually pro-wikipedia. Anyway, I've sent abuse messages to eleven places so far, I'll be happy if one of these dorks gets booted off their provider for this. Really, it's a pity, the article could have used some constructive editing. —Ben Brockert (42) UE News 10:12, May 22, 2005 (UTC)
- See also: Anonymous P2P link used twice // page locked
Contents
In the intruduction should be added, that Tor (the 2. Generation Onion Router) was initially designed and developed as part of the U.S. Naval Research Laboratory's Onion Routing program with support from ONR and DARPA.
- That's a bit misleading; Onion Routing began as an NRL project funded by ONR, and later by DARPA. Much of the Tor (2nd generation) work was contracted by NRL to Moria Research Labs (all of this in covered on the original Onion Routing website). But you're right: there is no mention of NRL in the article, yet they were the ones who created this.
TOC
When this page gets unlocked perhaps someone can add __NOTOC__ as the Table of Contents looks a bit silly given the pages layout. Dalf | Talk 21:33, 22 May 2005 (UTC)
- I did, but then thought better of it and just added normal sections, so that the TOC would look right. —Ben Brockert (42) UE News 22:28, May 22, 2005 (UTC)
Capitals
It seems unusual for both Onion Routing and Onion Router to be capitalized. Most of the former I found on Google were capitalized, but it appears that common use of the latter is moving away from capitalization. If popular use continues in that direction, at some point the article may need to be moved to Onion routing and the article changed accordingly. —Ben Brockert (42) UE News 22:28, May 22, 2005 (UTC)
- Well according to Wikipedia article naming policy the article should be named "Onion routing" with a small r. And even THE onion router (Tor) writes it as "onion routing" and not "Onion Routing" on its official main page. So it seemed to be a clear case, I moved it. I'll wait some day to edit the text in the article accordingly and fix the remaining double redirects, just in case you all go angry about the move... --David Göthberg 17:16, 31 July 2006 (UTC)
JAP
Someone should add JAP, the java anonymous proxy, to the software list- http://anon.inf.tu-dresden.de/index_en.html Family Guy Guy 08:01, 23 December 2005 (UTC)
JAP is a cascade-mix, not a circuit-based Onion Routing protocol, and would be inappropriate in an Onion Routing article. Try putting it in mix network after that article has been expanded. NoDepositNoReturn (talk) 03:47, 8 June 2008 (UTC)
Garlic routing?
Anyone have some info, or comparison of garlic and onion routing? Would such comparison be an appropriate extension of this article? -aryah, 20.04.2006 14:22 GMT
Dates, please!
It would be great to have some date information as to when each of these events occured. When was Onion Routing started at OAS? The bottom section says that TOR was introduced at the 13th Usenix Security Symposium: what year was that? Tzf 22:00, 21 September 2006 (UTC)
hop-by-hop
Why does hop-by-hop link here? Where is discussion of this term? I was looking for something associated with IPv6's "jumbo payload" option (apparently called hop-by-hop for some unknown reason. Fresheneesz 08:25, 3 November 2007 (UTC)
Separate article for mix-nets
Mix-nets (aka Chaum mixes) are technically similar, but algorithmically quite different both in makeup and in security properties compared to onion routing. I assume the redirect is due to lack of content on the mix-net entry; I would suggest that an article for mix-nets be created, or at the very least, section about the differences between onions and mixes be added to this article and the article renamed "mix-nets", as mix-nets are the more general primitive, while onion-routing refers to a specific protocol. NoDepositNoReturn (talk) 03:45, 8 June 2008 (UTC)
Nevermind, I see the problem: there exists an article Mix_networks but the Mix_net redirect was pointing here, not there. Fixed. NoDepositNoReturn (talk) 03:52, 8 June 2008 (UTC)
Parfait Routing
Why not call it Parfait Routing? Parfaits have layers and everyone loves parfaits! —Preceding unsigned comment added by 69.249.87.190 (talk) 07:58, 24 January 2009 (UTC)
More detailed information available
I have a page on my website that contains (in my not-so-humble opinion) a lot of good information and illustrations on onion-routing, but I know better than to add a link myself. If somebody would like to read my page, and then consider linking to it from an "External links" section, I think the Wikipedia article would benefit from it. But I'll let someone else decide whether it's a worthy link or not. Also, you can feel free to incorporate information and images from my page into the Wikipedia article, it's all original content which I'm releasing under GFDL. The page is bmearns.net/wwk/view/Onion_routing. 17:41, 10 September 2009 (UTC) —Preceding unsigned comment added by 159.215.16.130 (talk)
Confusing section: Routing onions
It is unclear in which cases symmetric and asymmetric encryption is used. And how symmetric keys are transferred is a complete mystery. — Vano 19:54, 2 October 2009 (UTC)
Hi there, fixed this up with what I hope is a better explanation. Please alter it to be more accurate, I hope I've done a reasonable job - it's very difficult to find the particulars on how onion routing actually *works*, which is why I found this explanation hard to understand and though it needed improving. - 2011-2-26
"Decoy Ciphers" Section
The Decoy Ciphers section appears to have been copy pasted directly from Null cipher, and makes absolutely no sense in this context. --DBN (talk) 05:15, 2 April 2011 (UTC)
Rewrite
Just finished a pretty substantial overhaul of the article. Edit summaries along the way mark some thoughts/questions. Feedback/improvements invited.
The biggest thing I feel like I left hanging is what to do about the material over at the Tor article that applies here (and would probably make more sense in this article if the sources weren't all about that specific implementation of onion routing and if that article weren't exponentially more prominent/important than this one). Specifically I'm looking at the Weaknesses section. I didn't expand the current section too far beyond what existed previously (condensed those into two, reworded, and elaborated), but there are many more at the Tor article... --— Rhododendrites talk \\ 05:35, 16 December 2014 (UTC)