prop279 discussion
Tor will intercept the SOCKS request, and use the
- executable at /usr/local/bin/unicorn to query the unicorn name system
- for elephantforum.corn. Tor communicates with the unicorn plugin
- using the Tor NS API through which name queries and their results can
- be transported using stdin/stdout.
Bad: logs can store timing information, which can be used to link network accesses patterns to a specific PC. It's better to have a daemon and local encrypted authenticated REST API to resolve names.