> Does it apply also to traffic going from/to hidden services? How safe are > users of hidden services when compared to users that browse clearnet with > Tor? Correlation is possible but very more difficult, because 3 nodes for client to rendez-vous points, then 3 others for rendez-vous to HS. Strength of HS is also to not have clearnet output, even if the  exit  node of one of the circuits id compromised, an attacker canât access clear data. Not the case on the standard case, when compromised exit node have access to all the user data if HTTPS is not used. Regards, -- Aeris Individual crypto-terrorist group self-radicalized on the digital Internet https://imirhil.fr/ Protect your privacy, encrypt your communications GPG : EFB74277 ECE4E222 OTR : 5769616D 2D3DAC72 https://cafÃ-vie-privÃe.fr/
Attachment:
signature.asc
Description: This is a digitally signed message part.
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk