[tor-relays] tor hidden services & SSL EV certificate

Josef Stautner hello at veloc1ty.de
Fri Jan 1 19:21:27 UTC 2016


You can use an Amazon EC2 G-Instance and Scallion if you don't have a
good GPU.

Am 01.01.2016 um 20:18 schrieb Manager Bahia del Sol LLC:
>  
> There is also
> Scallion
> https://github.com/lachesis/scallion
>  
> and Eshalot
> https://github.com/ReclaimYourPrivacy/eschalot
>  
> The hardware facebook used to bruteforce their onion address must have
> been very impressive.
>  
>>
>>
>> Message: 2
>> Date: Thu, 31 Dec 2015 10:33:19 -0900
>> From: Jesse V <kernelcorn at riseup.net <mailto:kernelcorn at riseup.net>>
>> To: tor-relays at lists.torproject.org
>> <mailto:tor-relays at lists.torproject.org>
>> Subject: Re: [tor-relays] tor hidden services & SSL EV certificate
>> Message-ID: <568582FF.40409 at riseup.net
>> <mailto:568582FF.40409 at riseup.net>>
>> Content-Type: text/plain; charset="windows-1252"
>>
>> On 12/31/2015 05:44 AM, Benoit Chesneau wrote:
>>
>>      Thanks it's useful :) I am know wondering how i can bruteforce a
>>     clear
>>      name for my site like facebook but i think it's all good for the
>>     rest :)
>>
>>
>> Like this: https://github.com/katmagic/Shallot
>>
>> It doesn't look like it's maintained, so you may want to examine forks,
>> but I've had success with Shallot as it is.
>>
>> -- 
>> Jesse V
>>
>>
>>
>> ------------------------------
>>
>  
>  
> -- 
>  Manager of Bahia del Sol LLC
>  
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160101/2d957d57/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160101/2d957d57/attachment.sig>


More information about the tor-relays mailing list