You are right. 32^16 which is 1.2 septillion (24 zeros). That's the total
number of possible .onion addresses at the current base32 format.
> On Mar 5, 2016, at 4:24 AM, grarpamp wrote:
>
>> On 3/4/16, Scfith Rise up wrote:
>> It _would_ be the same private key. Good luck with generating 1.2
On 3/4/16, Scfith Rise up wrote:
> It _would_ be the same private key. Good luck with generating 1.2 septillion
> permutations (16^32).
That's 2^48 too big, swap them.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.
On Fri, Mar 04, 2016 at 05:24:34PM -0700, Mirimir wrote:
> Right, _very_ difficult to find!
>
> But, let's say that one were found. Or occurred by chance. Am I correct
> that HSdirs would go with the server that had announced most recently?
Yes.
http://tor.stackexchange.com/questions/13/can-a-hi
On 03/04/2016 05:10 PM, Seth David Schoen wrote:
> Scfith Rise up writes:
>
>> I'm pretty sure that the onion address is generated directly from the
>> private key, at least if you have every played around with scallion or
>> eschalot. So what you just wrote doesn't apply in that way. But again,
Scfith Rise up writes:
> I'm pretty sure that the onion address is generated directly from the private
> key, at least if you have every played around with scallion or eschalot. So
> what you just wrote doesn't apply in that way. But again, I could be wrong.
Mirimir's reference at
https://tra
So it's not who is already published in the list but whoever has published most
recently? Very confused now. Seems like that works completely backwards from
how it should.
> On Mar 4, 2016, at 4:05 PM, Mirimir wrote:
>
>> On 03/04/2016 01:39 PM, Scfith Rise up wrote:
>> It _would_ be the same
On 03/04/2016 01:39 PM, Scfith Rise up wrote:
> It _would_ be the same private key. Good luck with generating 1.2
> septillion permutations (16^32).
That's not what I get from
https://trac.torproject.org/projects/tor/wiki/doc/HiddenServiceNames.
SHA1 collisions are possible.
> But could be doabl
I'm pretty sure that the onion address is generated directly from the private
key, at least if you have every played around with scallion or eschalot. So
what you just wrote doesn't apply in that way. But again, I could be wrong.
> On Mar 4, 2016, at 3:52 PM, Seth David Schoen wrote:
>
> Scfi
Scfith Rise up writes:
> It _would_ be the same private key. Good luck with generating 1.2 septillion
> permutations (16^32).
This would be true if the public key were used directly as the onion name
(which might be possible in certain elliptic curve systems because keys
are so small).
But in
It _would_ be the same private key. Good luck with generating 1.2 septillion
permutations (16^32).
But could be doable in a few years so to answer your question, I believe there
can only be one published in the HSDIR, so first come first served. Facebook's
would have to be DDOS / shutdown and
On 03/04/2016 01:03 PM, Andreas Krey wrote:
> On Fri, 04 Mar 2016 19:55:01 +, Flipchan wrote:
>> IF i generate a .onion domain , isnt there a risk that someone can generate
>> the same domain? I mean anyone can generate .onion domains and IF i got an
>> easy .onion address then some could eas
On Fri, 04 Mar 2016 19:55:01 +, Flipchan wrote:
> IF i generate a .onion domain , isnt there a risk that someone can generate
> the same domain? I mean anyone can generate .onion domains and IF i got an
> easy .onion address then some could easily generate that rsa key right?
There is no 'e
Hi,
creating a 1:1 copy of an onion key is very hard. You need much luck or
computing power to generate a key with the exact same hash as the key
you want to copy.
With modern computers and graphic cards it's very easy to find a key
with the same 4 digits but a whole 1:1 copy seems to be impossibl
IF i generate a .onion domain , isnt there a risk that someone can generate the
same domain? I mean anyone can generate .onion domains and IF i got an easy
.onion address then some could easily generate that rsa key right?
--
Sincerly Flipchan
--
tor-talk mailing list - tor-talk@lists.torproje
14 matches
Mail list logo