[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Hidden Services

On 9/17/12 1:22 PM, andrew@xxxxxxxxxxxxx wrote:
> On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes.rm@xxxxxxxxx wrote 1.0K bytes in 19 lines about:
> : Clearly brute forcing would be way, way out of the question just based on
> : sheer size. I've read about the introduction points being stored on some
> : type of DHT. Is it possible to access the hash table in order to pull the
> : necessary information for indexing the entire hidden services set? I figure
> Is it possible? Yes. I've met some people who tell me they run a relay
> which records every hidden service descriptor. They don't tell me more
> than that. All this tells them is a list of hidden service descriptors
> their relay has seen, not where they are, or maybe not even accessible
> ports.
> There are already a few sites trying to index .onionland to
> varying degrees of success. http://ahmia.fi/ is one. Torgle,
> https://github.com/torgle, is another. I would expect some national law
> enforcement or intelligence agency has one as well.
We've been thinking for next release of Tor2web 3 to add such a similar
features to facilitate indexing of visited TorHs by 3rd part projects
https://github.com/globaleaks/Tor2web-3.0/issues/19 .

tor-talk mailing list