[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Please help me test my hidden service
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Please help me test my hidden service
- From: Nils Vogels <bacardicoke@xxxxxxxxx>
- Date: Tue, 4 Aug 2009 10:47:25 +0200
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 04 Aug 2009 04:47:29 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=/Z0TMeUdGdlTkY+eOSEW8bR+GA0VQgRcfIUL6XBcOng=; b=UD83kSK5Lj6Ol4S9QVRsYY3NO2NDLnUyNnDyBLU0fFQvM4uIZCQSf9w5goLNxrelMy vXa9EFnYfKME1I6ICSXNkQdM8kDzrD++VMamJxSppyAM6+Bx+Zx12yKUp/j5mXftHOxK RsMbGQRW6P/OMKyiRZWqWRY5Zw2lh8fQ7MKyk=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=QF4TDMUxH+2p02vwys9gD/xZ43R/TWau/joWdxFwumILPSVt0Z4S0zLSA5PcrC11LV rxicORBZOuKABDdwaRB+Ova4uakUI/ln0GOOh6PIaP0LihLKA1IcyNNLUH4qkhqe4CdH NCgm5H8vfGkth03slvACqsjulWAE8cXK8OVEs=
- In-reply-to: <200908040826.n748QRfu021737@xxxxxxxxxxxxx>
- References: <200908040826.n748QRfu021737@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Hi Scott,
On Tue, Aug 4, 2009 at 10:26 AM, Scott Bennett<bennett@xxxxxxxxxx> wrote:
> For that matter, it's probably best *not* to run most kinds of hidden
> services on tor relays precisely because tor relays are well known through
> the directory. Running a hidden service on a client-only tor would be the
> safest way because clients are not listed anywhere as such. There might be
> a place for running a hidden service on a bridge, but it would have to be
> for something not terribly dangerous to the hidden service operator because
> bridges *are* known to the bridge authorities and thus must be considered to
> be listed somewhere. Something like a web service that is also accessible
> directly and publicly and that presents no known danger to its operator (e.g.,
> the various tor status pages) can reasonably be run on a tor relay node,
> a bridge, or a client.
Just trying to figure out what you are saying here:
A hidden service has it's own identifier and to my knowledge, there is
no link between the hidden service and the node that is running it,
you seem to suggest otherwise?
If there is a link between the hidden service and the node that is
running it, then I wonder how *hidden* a hidden service actually is
... since at that point it is just "a service running on node x" and
the term hidden service would be kind of deceiving.
Just because the node running it is a relay or a bridge, does that
make it less hidden? If there is no link between the service and the
node, I don't see how.
Greetings,
Nils
--
Simple guidelines to happiness:
Work like you don't need the money,
Love like your heart has never been broken and
Dance like no one can see you.