Dear Gabor,

The risk is that if the user is accessing the normal site over http is
that the data may be manipulated by for example the exit node.
The user doesn't have this problem if all data stays inside of the tor
network.

Allow me to quote Malte;
>1) You get TLS encryption and verification for free.
>2) You enable other servers who want to stay anonymous to stay
completely within the Tor network (and also not accidentally not use    it).



Kind regards,

Christiaan de Die le Clercq

PGP: 0x9FB800372F2546D8

On 04/28/2015 11:53 AM, Kiss Gabor (Bitman) wrote:
> Dear Christiaan,
> 
>> Hidden services are quite secure in the tor network. If the user wants
>> to use it they can.
>> This one is not for the protection of the server, just for if the user
>> wants to use it.
> 
> Secure?
> Eeerrr... what is the risk of using a public service in
> TOR user's point of view? (Compared to using a hidden service.)
> His identity is hidden anyway.
> 
> So far I knew the concept of hidden service is what its name:
> To hide the identity of the server.
> 
> Cheers
> 
> Gabor
> 

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to