Please refer to >>490 and report any issues in the same thread
Are there any restrictions for posters using tor?
Currently, no. It will stay that way as long as it doesn't become a problem.
You should add a "use the hidden service dipshit" function to check if the poster IP is a Tor exit node. It would be useful for when someone inevitably wants to host an onion using your software.
>detect exit node
possible, but not implemented atm
>host as hidden service
I have a few things in mind that would need to change in order to run as a hidden service, and the webring would also need some changes to work over TOR (for all webring members).
Mosts hosts forbid exit nodes afaik, but a hidden service should be fine. I will check my hosts policy this weekend and maybe get one running. No promises though.
>hosting Tor anything
I wouldn't do that if I were you. I was mainly speaking for other people who may want to host. Not everyone is going to want to join the webring either.
The host is US-based and I don't have any qualms about running a hidden service. Australia sucks dick but if I was really worried, shell companies can be registered from just about anywhere. My identity is no secret, so if somebody had a problem with the site they could already send me nasty threats, and a hidden service would not make me any less strict on content rules.
Also if you run strictly a hidden service its pretty hard to find the origin server IP and thus be deplatformed, so a webring isn't really necessary.
I see, that's interesting. Any good source to read up on tor. Since I use it all the time as an end-user maybe I should learn more about it tbh.
The tor project themself host some good information and the technical papers aren't too hard to understand. You can start with some reading here:
ok, thanks. i have the first phase of my software working now, so i'll make a thread on /tech/ this weekend.
Sweet, sounds good.