On 8/06/12 9:53 AM, Matthew Kaufman wrote:
Yes, if those services are vulnerable whether they're running as a Tor service or not.Great questions. And does hosting a hidden service exposé the machine to penetration attacks?
The other concern is that hidden services expose information about the system that the hidden service is running on, i.e. a http server that lists the operating system that it's running on, or a daemon that shows the location that the hidden service is running on.
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk