hidden services spoof

Arrakistor arrakistor at gmail.com
Mon Sep 11 21:10:27 UTC 2006


I  am  writing  an  updater  for  tor to automatically grab the latest
version.  One  problem  I am coming across is where to host it so they
cannot  be  spoofed.  I  was  thinking  of putting it at a server in a
.onion  address.  How easily can a node in the tor network be spoofed?
Is  there  a  better  solution  than  hosting the tor updates inside a
.onion server?

Regards,
 Arrakistor



More information about the tor-talk mailing list