[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] securely run a hidden service



i've seen snippets of post-silk road "how to securely run a hidden service" [1] [2] but i haven't found a large list of steps needed to be taken that would tremendously help to prevent de-anonymisation.

can someone point me to a large list of things that should be done (or make one!) to prevent this?
On 11/03/2014 16:16, Michael Ball wrote:
i've seen snippets of post-silk road "how to securely run a hidden service" [1] [2] but i haven't found a large list of steps needed to be taken that would tremendously help to prevent de-anonymisation.

can someone point me to a large list of things that should be done (or make one!) to prevent this?

I don't have a list.
But if you run HS in the virtual machine that is disconnected from internet, doesn't have any personal information on it, and the host only forwards HS requests to it (from the tor process), this should be quite bullet proof against identity leaks. And if you ever find yourself in the heightened state of paranoia about the off-chance that virtual machine can somehow leak the memory contents, the next logical step is to run HS on the physically separate machine, on the separate network, that is not connected to internet.

Yuri
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk