[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] How to identify owners of .onion services?
With all the talk about the N_S_A targeting traffic between exit nodes
and destination websites, I am wondering how this may work for hidden
services (.onion domains). There are no exit nodes as everything occurs
within the hidden services network.
How would it be possible for an adversary to learn that Person X rented
a Tor hidden server from a hosting company that provided .onion domains
and hosting (assuming that Person X paid for his/her hosting with
Bitcoins and did not do anything stupid to tie his or her 'clear web'
identity to his or her .onion identity)?
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk