[tor-talk] privacy of hidden services
aeris+tor at imirhil.fr
Wed Dec 21 18:37:13 UTC 2016
> Would anyone outside of myself and those two
> people be able to determine the onion address
Yes. Your onion address is published on a DHT, hosted accross all nodes with
HSDir flag. Some bad behaviouring relays try to enumerate all onion addresses
by massive HSDir node creation to fetch different part of the DHT each time.
> or monitor activity related to the hidden service such as HS descriptor
uploads and downloads from directory servers, or connection attempts via
> introduction or rendezvous points?
Yes too. HSDir node and rendez-vous points can monitor HS usage, because
HSDir/RdVPoint usage for a single HS is correlated to this HS usage.
> Would it make a difference if the hidden service used basic or stealth
AFAIK, no. Auth for a HS is only to forbid unallowed client to connect to it,
but doesn't change the way HSDir and RdVPoint are handled.
Individual crypto-terrorist group self-radicalized on the digital Internet
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: This is a digitally signed message part.
More information about the tor-talk