|
@@ -135,3 +135,23 @@ Status: Draft
|
|
answers to popular requests, so we don't have to keep getting
|
|
answers to popular requests, so we don't have to keep getting
|
|
them again.)
|
|
them again.)
|
|
|
|
|
|
|
|
+6. Outstanding problems
|
|
|
|
+
|
|
|
|
+ 1) HTTP proxies already exist. Why waste our time cloning one
|
|
|
|
+ badly? When we clone existing stuff, we usually regret it.
|
|
|
|
+
|
|
|
|
+ 2) It's overbroad. We only seem to need a secure get-a-tor feature,
|
|
|
|
+ and instead we're contemplating building a locked-down HTTP proxy.
|
|
|
|
+
|
|
|
|
+ 3) It's going to add a fair bit of complexity to our code. We do
|
|
|
|
+ not currently implement HTTPS. We'd need to refactor lots of the
|
|
|
|
+ low-level connection stuff so that "SSL" and "Cell-based" were no
|
|
|
|
+ longer synonymous.
|
|
|
|
+
|
|
|
|
+ 4) It's still unclear how effective this proposal would be in
|
|
|
|
+ practice. You need to know that this feature exists, which means
|
|
|
|
+ somebody needs to tell you about a bridge (mirror) address and tell
|
|
|
|
+ you how to use it. And if they're doing that, they could (e.g.) tell
|
|
|
|
+ you about a gmail autoresponder address just as easily, and then you'd
|
|
|
|
+ get better authentication of the Tor program to boot.
|
|
|
|
+
|