[tor-talk] privacy of hidden services

Aeris aeris+tor at imirhil.fr
Wed Dec 21 18:37:13 UTC 2016


> Would anyone outside of myself and those two
> people be able to determine the onion address

Yes. Your onion address is published on a DHT, hosted accross all nodes with 
HSDir flag. Some bad behaviouring relays try to enumerate all onion addresses 
by massive HSDir node creation to fetch different part of the DHT each time.

> or monitor activity related to the hidden service such as HS descriptor 
uploads and downloads from directory servers, or connection attempts via
> introduction or rendezvous points? 

Yes too. HSDir node and rendez-vous points can monitor HS usage, because 
HSDir/RdVPoint usage for a single HS is correlated to this HS usage.

> Would it make a difference if the hidden service used basic or stealth 
authorization?

AFAIK, no. Auth for a HS is only to forbid unallowed client to connect to it, 
but doesn't change the way HSDir and RdVPoint are handled.

Regards,
-- 
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/

Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20161221/a1b5b813/attachment.sig>


More information about the tor-talk mailing list