[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Hidden Services



On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes.rm@xxxxxxxxx wrote 1.0K bytes in 19 lines about:
: Clearly brute forcing would be way, way out of the question just based on
: sheer size. I've read about the introduction points being stored on some
: type of DHT. Is it possible to access the hash table in order to pull the
: necessary information for indexing the entire hidden services set? I figure

Is it possible? Yes. I've met some people who tell me they run a relay
which records every hidden service descriptor. They don't tell me more
than that. All this tells them is a list of hidden service descriptors
their relay has seen, not where they are, or maybe not even accessible
ports.

There are already a few sites trying to index .onionland to
varying degrees of success. http://ahmia.fi/ is one. Torgle,
https://github.com/torgle, is another. I would expect some national law
enforcement or intelligence agency has one as well.

-- 
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk