[tor-relays] Darknet Shenanigans [was: suspicious "Relay127001" relays]

Tim Wilson-Brown - teor teor2345 at gmail.com
Thu Jul 7 05:45:26 UTC 2016


> On 7 Jul 2016, at 15:29, Andreas Krey <a.krey at gmx.de> wrote:
> 
> On Wed, 06 Jul 2016 15:06:00 +0000, grarpamp wrote:
> ...
>> https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html
> 
> Is there a way to make tor log connection attempts to any ports
> on an hidden service address, independent of whether the port
> actually has a HiddenServicePort?
> 
>> All quite expected and well known ever since the
>> dawn of overlay networks. Same with the Internet.
> 
> Also, wasn't there a change that made discovery impossible?

We're working on it, and it's called "next generation hidden services".
Until then, relays get banned for this behaviour.

Tim

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n




-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160707/90992bf8/attachment.sig>


More information about the tor-relays mailing list