-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Support Tor-hidden homeservers #2111
Description
Recently, the US government asked Twitter for the real identity of one of its users, I think. This raised a question in my mind: is Matrix safer than Twitter for this use case? Will an individual holding a HS for a small group of people be more efficient than Twitter in suing a government in response, to protect his users?
Unfortunately, I don't think so, as size is required to make governments flex, would it be just to pay legal costs.
In order to better protect the users, a technical solution could be put in place to actually protect HS admins from being "blackmailed" (I don't know the actual term for a government forcing one to deliver information) into giving away information about its users. Even the users using Tor is not enough, as private messages could be reached this way, etc.
I think this calls for running some matrix servers as Tor hidden services.
The main issue we identified is that not all matrix instances run a Tor client. A potential solution is to change the protocol so that designated Tor bridges relay messages from/to the Tor network. Each matrix server would be configured to use one (or more?) such bridge(s), to get the message updates from Tor. As I don't know the details of the protocol, I don't know whether this means the server would have to trust the Tor bridge relatively to the name of the source server, but I'm not sure it matters much.
This would most likely require a protocol addition to support Tor bridges, but I'd think it's worth it, for privacy and security reasons.
What do you think about it?