[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] privacy of hidden services
Hi Flipchan, I'm not concerned with limiting access--I'm concerned
with who if anyone is able to detect the existence and activity of the
HS, and more specifically at this point, who is able to detect the
existence and activity of a HS that uses stealth auth when the onion
address is only distributed to authorized users.
On Wed, Dec 21, 2016 at 3:06 PM, Flipchan <flipchan@xxxxxxxxxx> wrote:
> Limit access for unwanted registerd like he says have A page and use /jdjenwlsishdjshdysoalwjdbebs instead of /login
> Allen <allenpmd@xxxxxxxxx> skrev: (21 december 2016 20:57:47 CET)
>>> So yes, ideally encrypt your Introduction Points (basic) and
>>> identity keys (stealth) [this also encrypts sets of IPs].
>>> use random slugs in URLs as OnionShare does (if you're doing web).
>>ok, I'm not sure I completely understand. If my HS uses stealth auth,
>>what data remains in the clear? Is the HS descriptor on the HS dirs
>>stored using a persistent identifier, or does the identifier change
>>every 24 hours? Are there any persistent identifiers that can be
>>observed on the network to track usage of the HS? Thanks much.
>>tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
>>To unsubscribe or change other settings go to
> Sincerly flipchan - LayerProx dev
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to