[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Repercussion from turning every Tor user into a hidden service?

<peter+tor@xxxxxxxxxxxxx> wrote:
> On 8/06/12 9:53 AM, Matthew Kaufman wrote:
> > Great questions.  And does hosting a hidden service exposà the machine
> to
> > penetration attacks?
> Yes, if those services are vulnerable whether they're running as a Tor
> service or not.
> The other concern is that hidden services expose information about the
> system that the hidden service is running on, i.e. a http server that
> lists the operating system that it's running on, or a daemon that shows

Does not apply to this question. I asked only about adding an unused Tor hidden service port. No http server software. No other server software.

The pure hidden service shouldn't tell anything about the operating system. Actually it wouldn't even reply anything?

The only added vulnerability were the Tor virtual hidden service port, which were running vs. not running. No additional non-Tor software.

powered by Secure-Mail.biz - anonymous and secure e-mail accounts.

tor-talk mailing list