{"guid":"7ca79a9c-c08d-5d37-b149-6bc876b20201","title":"Gosling: Build Anonymous, Secure, and Metadata-Resistant Peer-to-Peer Applications using Tor Onion Services","subtitle":null,"slug":"why2025-95-gosling-build-anonymous-secure-and-metadata-resistant-peer-to-peer-applications-using-tor-onion-services","link":"https://program.why2025.org/why2025/talk/TMS3DC/","description":"Gosling is a Tor onionservice-based protocol and Rust reference-implementation which allows developers to build privacy-preserving p2p applications with the following properties:\n- persistent authenticated peer identity\n- end-to-end encrypted\n- anonymity\n- metadata resistance\n- decentralisation\n- real-time communication\n\nThis talk will go over the complexities involved in combining all of these properties (with a focus on metadata resistance) and describe how Gosling solves these problems.\n\nProject Website: https://gosling.technology\nGithub Page: https://github.com/blueprint-freespeech/gosling\n\nLicensed to the public under https://creativecommons.org/licenses/by/4.0/","original_language":"eng","persons":["morgan"],"tags":["95","2025","why2025","Wonderful creations","Brachium","why2025-eng","Day 3"],"view_count":116,"promoted":false,"date":"2025-08-09T19:00:00.000+02:00","release_date":"2025-08-11T00:00:00.000+02:00","updated_at":"2026-04-03T23:45:07.353+02:00","length":2362,"duration":2362,"thumb_url":"https://static.media.ccc.de/media/events/why2025/95-7ca79a9c-c08d-5d37-b149-6bc876b20201.jpg","poster_url":"https://static.media.ccc.de/media/events/why2025/95-7ca79a9c-c08d-5d37-b149-6bc876b20201_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/why2025/95-7ca79a9c-c08d-5d37-b149-6bc876b20201.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/why2025/95-7ca79a9c-c08d-5d37-b149-6bc876b20201.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/why2025-95-gosling-build-anonymous-secure-and-metadata-resistant-peer-to-peer-applications-using-tor-onion-services","url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_title":"What Hackers Yearn 2025","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025","related":[],"recordings":[{"size":262,"length":2362,"mime_type":"video/webm;codecs=av01","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-11T13:18:27.400+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/av1-hd/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_av1-hd.webm","url":"https://api.media.ccc.de/public/recordings/89405","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":36,"length":2362,"mime_type":"audio/mpeg","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-11T11:40:33.770+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/mp3/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/89371","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":25,"length":2362,"mime_type":"audio/opus","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-08-11T11:40:29.681+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/opus/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_opus.opus","url":"https://api.media.ccc.de/public/recordings/89370","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":329,"length":2362,"mime_type":"video/webm","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-11T13:21:46.957+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-hd/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/89442","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":109,"length":2362,"mime_type":"video/webm","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-11T13:21:36.618+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/webm-sd/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/89441","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":90,"length":2362,"mime_type":"video/mp4","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-08-11T11:42:03.983+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-sd/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_sd.mp4","url":"https://api.media.ccc.de/public/recordings/89373","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"},{"size":279,"length":2362,"mime_type":"video/mp4","language":"eng","filename":"why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-08-11T11:40:10.408+02:00","recording_url":"https://cdn.media.ccc.de/events/why2025/h264-hd/why2025-95-eng-Gosling_Build_Anonymous_Secure_and_Metadata-Resistant_Peer-to-Peer_Applications_using_Tor_Onion_Services_hd.mp4","url":"https://api.media.ccc.de/public/recordings/89369","event_url":"https://api.media.ccc.de/public/events/7ca79a9c-c08d-5d37-b149-6bc876b20201","conference_url":"https://api.media.ccc.de/public/conferences/WHY2025"}]}