[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] How to identify owners of .onion services?




With all the talk about the N_S_A targeting traffic between exit nodes and destination websites, I am wondering how this may work for hidden services (.onion domains). There are no exit nodes as everything occurs within the hidden services network.

How would it be possible for an adversary to learn that Person X rented a Tor hidden server from a hosting company that provided .onion domains and hosting (assuming that Person X paid for his/her hosting with Bitcoins and did not do anything stupid to tie his or her 'clear web' identity to his or her .onion identity)?

--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk