[Cryptography] Are Tor hidden services really hidden?

Phillip Hallam-Baker hallam at gmail.com
Thu Feb 13 22:35:11 EST 2014


On Thu, Feb 13, 2014 at 9:04 PM, grarpamp <grarpamp at gmail.com> wrote:

> People really should read the Tor documentation and try
> out the client alongside it before speculating on how it
> works, what it is good against or not, what has or hasn't
> happened to users and why, etc.
>
> https://www.torproject.org/
> https://blog.torproject.org/
>
>
If

1) The attacker controls multiple rendezvous points and
2) The attacker controls multiple clients, using them to make contact
attempts and
3) Traffic to the hidden service with the drug site is an appreciable
proportion of the total hidden service traffic

Then, a timing attack seems very likely to reveal the IP address of the
exit node for the hidden service which can then be unrolled in turn.


-- 
Website: http://hallambaker.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140213/78b3c4fe/attachment.html>


More information about the cryptography mailing list