[tor-talk] Large spike in .onion addresses - port scan?
coderman
coderman at gmail.com
Mon Feb 22 05:43:47 UTC 2016
On 2/22/16, Green Dream <greendream848 at gmail.com> wrote:
>...
> Interesting. Any idea what they're able to enumerate with the modified
> version of Tor?
they're able to enumerate the onions which land on their node(s) per
O(1) mapping in HSDir participants. e.g. "get lucky"
> Can the Tor network be hardened from this client-side
> "attack"?
see also: "Hidden Services Need Some Love"
- https://blog.torproject.org/blog/hidden-services-need-some-love
best regards,
More information about the tor-talk
mailing list