On 9/17/12 1:22 PM, and...@torproject.is wrote: > On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes...@gmail.com wrote 1.0K > bytes in 19 lines about: > : Clearly brute forcing would be way, way out of the question just based on > : sheer size. I've read about the introduction points being stored on some > : type of DHT. Is it possible to access the hash table in order to pull the > : necessary information for indexing the entire hidden services set? I figure > > Is it possible? Yes. I've met some people who tell me they run a relay > which records every hidden service descriptor. They don't tell me more > than that. All this tells them is a list of hidden service descriptors > their relay has seen, not where they are, or maybe not even accessible > ports. > > There are already a few sites trying to index .onionland to > varying degrees of success. http://ahmia.fi/ is one. Torgle, > https://github.com/torgle, is another. I would expect some national law > enforcement or intelligence agency has one as well. > We've been thinking for next release of Tor2web 3 to add such a similar features to facilitate indexing of visited TorHs by 3rd part projects https://github.com/globaleaks/Tor2web-3.0/issues/19 .
-naif _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk