[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] General question regarding tor, ssl and .onion.



Jeremy Rand writes:

> It's theoretically possible to use naming systems like Namecoin to
> specify TLS fingerprints for connections to Tor hidden services, which
> would eliminate the need for a CA.  I'm hoping to have a proof of
> concept of such functionality soon.

Is there a way to prevent an attacker from simply claiming the same
identifier in Namecoin before the actual hidden service operator does?

-- 
Seth Schoen  <schoen@xxxxxxx>
Senior Staff Technologist                       https://www.eff.org/
Electronic Frontier Foundation                  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk