[tor-talk] securely run a hidden service

Yuri yuri at rawbw.com
Tue Nov 4 01:04:34 UTC 2014


i've seen snippets of post-silk road "how to securely run a hidden 
service" [1] [2] but i haven't found a large list of steps needed to be 
taken that would tremendously help to prevent de-anonymisation.

can someone point me to a large list of things that should be done (or 
make one!) to prevent this?
On 11/03/2014 16:16, Michael Ball wrote:
> i've seen snippets of post-silk road "how to securely run a hidden 
> service" [1] [2] but i haven't found a large list of steps needed to 
> be taken that would tremendously help to prevent de-anonymisation.
>
> can someone point me to a large list of things that should be done (or 
> make one!) to prevent this?

I don't have a list.
But if you run HS in the virtual machine that is disconnected from 
internet, doesn't have any personal information on it, and the host only 
forwards HS requests to it (from the tor process), this should be quite 
bullet proof against identity leaks. And if you ever find yourself in 
the heightened state of paranoia about the off-chance that virtual 
machine can somehow leak the memory contents, the next logical step is 
to run HS on the physically separate machine, on the separate network, 
that is not connected to internet.

Yuri


More information about the tor-talk mailing list