[tor-talk] Hidden server path
outlaw at omail.pro
Wed Jan 9 21:47:10 UTC 2013
> > Or malicious code on the last node :)
> That would be the server hosting the hidden service. But the server of
> some Website you visit and what it does with your requests is beyond
> your control anyways (if it not your own server).
So path can be seen by client and server that hosts hidden service,
malicious or not. Are you sure? :) I mean as I know SSL connection via
https protocol is done like "Connecting to server -> Establishing
secure connection -> After that go to target page, make requests,
download all things etc. ". So global observer cannot see what is
transferred (what I`d like to know for sure is path and GET request),
only the fact of connection and some encrypted traffic
- is this somewhat valid for onion-land? Thanks!
More information about the tor-talk