> Would anyone outside of myself and those two > people be able to determine the onion address Yes. Your onion address is published on a DHT, hosted accross all nodes with HSDir flag. Some bad behaviouring relays try to enumerate all onion addresses by massive HSDir node creation to fetch different part of the DHT each time. > or monitor activity related to the hidden service such as HS descriptor uploads and downloads from directory servers, or connection attempts via > introduction or rendezvous points? Yes too. HSDir node and rendez-vous points can monitor HS usage, because HSDir/RdVPoint usage for a single HS is correlated to this HS usage. > Would it make a difference if the hidden service used basic or stealth authorization? AFAIK, no. Auth for a HS is only to forbid unallowed client to connect to it, but doesn't change the way HSDir and RdVPoint are handled. Regards, -- Aeris Individual crypto-terrorist group self-radicalized on the digital Internet https://imirhil.fr/ Protect your privacy, encrypt your communications GPG : EFB74277 ECE4E222 OTR : 5769616D 2D3DAC72 https://café-vie-privée.fr/
Attachment:
signature.asc
Description: This is a digitally signed message part.
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk