[tor-talk] More secure hidden service as client or relay?

HardKor hardkor.info at gmail.com
Fri Jul 20 14:10:53 UTC 2012


When you run a relay, your ip become public so it gives some information
about you and your potential location. If your enemy knows that you are in
a specific region for exemple it could become dangerous for you !
On the other hand, it would be more difficult for your enemy to exploit the
dump of your communications to conclude that you are de hidden service
owner than if you run a client.

Don't forget to restrict the access to your service, don't let it open
world wide ;)

On Fri, Jul 20, 2012 at 1:16 AM, Daniel Dennis <sdjfjsdfiuhszduh at fastmail.fm
> wrote:

> I read about a successful attack on hidden services. The two major
> attacks i remember were 1) Looking at IP addresses in the network and
> check if the hidden service is up. When its down you can narrow the ip
> address down. 2) Disconnecting and reconnecting to the hidden service
> hoping you become a peer and use a timing attack. This is prevented by
> node guards which was talked about in the PDF (before and after the
> guards).
>
> That same pdf mention clients were easier to find then relays. I'm not
> sure why.
> Right now at this moment what is more secure when running a hidden
> service. When being a client or relay?
>
> --
> http://www.fastmail.fm - Or how I learned to stop worrying and
>                           love email again
>
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>


More information about the tor-talk mailing list