[tor-relays] hi-jacking an onion address

Toralf Förster toralf.foerster at gmx.de
Sat Oct 14 07:33:08 UTC 2017


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

I do wonder how Tor handles the case that a malicious Tor relay provides the same onion address as another Tor relay ?

- -- 
Toralf
PGP C4EACDDE 0076E94E
-----BEGIN PGP SIGNATURE-----

iI0EAREIADUWIQQaN2+ZSp0CbxPiTc/E6s3eAHbpTgUCWeG9sRccdG9yYWxmLmZv
ZXJzdGVyQGdteC5kZQAKCRDE6s3eAHbpTq52AP91qQFpcMqxFJk/o4T5M7YZLSs3
D+W/GErC/9dr30ZRJQD+INHijrLzJpRwLNU3/8Pd6ez/wgj4oUv6FA4rgh9kBP8=
=quQI
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list