[tor-talk] General question regarding tor, ssl and .onion.

Seth David Schoen schoen at eff.org
Sun Aug 9 01:04:19 UTC 2015

Jeremy Rand writes:

> It's theoretically possible to use naming systems like Namecoin to
> specify TLS fingerprints for connections to Tor hidden services, which
> would eliminate the need for a CA.  I'm hoping to have a proof of
> concept of such functionality soon.

Is there a way to prevent an attacker from simply claiming the same
identifier in Namecoin before the actual hidden service operator does?

Seth Schoen  <schoen at eff.org>
Senior Staff Technologist                       https://www.eff.org/
Electronic Frontier Foundation                  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107

More information about the tor-talk mailing list