[tor-talk] privacy of hidden services

Flipchan flipchan at riseup.net
Wed Dec 21 20:06:21 UTC 2016


Limit access for unwanted registerd like he says have A page and use /jdjenwlsishdjshdysoalwjdbebs instead of /login 

Allen <allenpmd at gmail.com> skrev: (21 december 2016 20:57:47 CET)
>> So yes, ideally encrypt your Introduction Points (basic) and
>obfuscate
>> identity keys (stealth) [this also encrypts sets of IPs].
>Non-ideally,
>> use random slugs in URLs as OnionShare does (if you're doing web).
>
>ok, I'm not sure I completely understand.  If my HS uses stealth auth,
>what data remains in the clear?  Is the HS descriptor on the HS dirs
>stored using a persistent identifier, or does the identifier change
>every 24 hours?  Are there any persistent identifiers that can be
>observed on the network to track usage of the HS?  Thanks much.
>-- 
>tor-talk mailing list - tor-talk at lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
Sincerly flipchan - LayerProx dev


More information about the tor-talk mailing list