Quoth Mike Perry: > If you're talking about attacks as strong as end-to-end correlation, > then it turns out hidden services have similar weaknesses on that order. > There are a number of points where the adversary can inject themselves > either to observe or manipulate hidden service circuit construction. > > ...
Many thanks Mike for the detailed response; I wasn't aware of this work. > Still, despite all of this, I still think hidden services have an > important roll to play in Tor. The search engines of today just aren't > the proper use case for them right now. That makes sense. Hidden services are still obviously important for running servers that can't safely reveal their location, anyway. Thanks again. -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech