[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] privacy of hidden services



> Would anyone outside of myself and those two
> people be able to determine the onion address

Yes. Your onion address is published on a DHT, hosted accross all nodes with 
HSDir flag. Some bad behaviouring relays try to enumerate all onion addresses 
by massive HSDir node creation to fetch different part of the DHT each time.

> or monitor activity related to the hidden service such as HS descriptor 
uploads and downloads from directory servers, or connection attempts via
> introduction or rendezvous points? 

Yes too. HSDir node and rendez-vous points can monitor HS usage, because 
HSDir/RdVPoint usage for a single HS is correlated to this HS usage.

> Would it make a difference if the hidden service used basic or stealth 
authorization?

AFAIK, no. Auth for a HS is only to forbid unallowed client to connect to it, 
but doesn't change the way HSDir and RdVPoint are handled.

Regards,
-- 
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/

Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk