I am not positive about this situation to improve over time. Enough time has passed. OFTC does not seem to care/prioritize this issue enough. I think it's well justified to make the change.
Ideally, the whole Tor community (Torproject, Tails, Whonix, Qubes, ...) would switch to a new, functional, Tor-friendly IRC network.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Hackint requires SASL auth for connections from Tor (and registration over clearnet in this case), so I don't think it's an appropriate choice here. In addition, what will Hackint do if someone starts brute-forcing accounts over SASL? That's why Freenode turned off Tor connections, from what I understand.
Tor Team should show everyone how to provide public chat for Tor users, isn't it?
Or just write in Contacts that they cannot provide IRC/chat for Tor users.
(quotes collection):
"Sign in to OFTC with your Google+ OAuth"
As of 2017-03-26, NickServ will require nick verification via services.oftc.net for the +R user mode. This affects channels using the +M and +R channel modes.
a lot of ordinary new participants will just walk away because verification is oppressive
but not to spammers etc, who are more highly motivated
well and #tor will just stay +R, which harms it the most due to it being full of people who often do not want javascript enabled :/
A) OFTC has its issues but on the whole it's been quite pleasant compared to other irc networks. So I would worry about the case where we move somewhere, the new place turns out to not be able to handle all of our issues, and then we don't have anyplace to move back to because we burned our bridges. I think any move we might make should have a good answer for this concern.
B) Longer term, I think we need somebody to build the irc proxy + nymble idea. That is, we need an irc proxy that can accept connections from Tor users, allow them to authenticate using some variant of the anonymous credentials idea, and then pass their connections (or their traffic, or however it works) to the main irc network. Then if they get blacklisted from the main irc network, the proxy notices and revokes their credentials.
I guess item 'B' is one instance of the more general "irc needs to gain better abuse handling mechanisms" goal. I'd love for somebody to work on it, but so far it hasn't been something that Tor has developers for.