[tor-talk] privacy of hidden services

Allen allenpmd at gmail.com
Wed Dec 21 20:19:52 UTC 2016


Hi Flipchan, I'm not concerned with limiting access--I'm concerned
with who if anyone is able to detect the existence and activity of the
HS, and more specifically at this point, who is able to detect the
existence and activity of a HS that uses stealth auth when the onion
address is only distributed to authorized users.

On Wed, Dec 21, 2016 at 3:06 PM, Flipchan <flipchan at riseup.net> wrote:
> Limit access for unwanted registerd like he says have A page and use /jdjenwlsishdjshdysoalwjdbebs instead of /login
>
> Allen <allenpmd at gmail.com> skrev: (21 december 2016 20:57:47 CET)
>>> So yes, ideally encrypt your Introduction Points (basic) and
>>obfuscate
>>> identity keys (stealth) [this also encrypts sets of IPs].
>>Non-ideally,
>>> use random slugs in URLs as OnionShare does (if you're doing web).
>>
>>ok, I'm not sure I completely understand.  If my HS uses stealth auth,
>>what data remains in the clear?  Is the HS descriptor on the HS dirs
>>stored using a persistent identifier, or does the identifier change
>>every 24 hours?  Are there any persistent identifiers that can be
>>observed on the network to track usage of the HS?  Thanks much.
>>--
>>tor-talk mailing list - tor-talk at lists.torproject.org
>>To unsubscribe or change other settings go to
>>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
> --
> Sincerly flipchan - LayerProx dev
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


More information about the tor-talk mailing list