[tor-talk] Large spike in .onion addresses - port scan?

coderman coderman at gmail.com
Mon Feb 22 05:43:47 UTC 2016


On 2/22/16, Green Dream <greendream848 at gmail.com> wrote:
>...
> Interesting. Any idea what they're able to enumerate with the modified
> version of Tor?

they're able to enumerate the onions which land on their node(s) per
O(1) mapping in HSDir participants. e.g. "get lucky"



> Can the Tor network be hardened from this client-side
> "attack"?

see also: "Hidden Services Need Some Love"
 - https://blog.torproject.org/blog/hidden-services-need-some-love


best regards,


More information about the tor-talk mailing list