On 9/17/12 1:22 PM, and...@torproject.is wrote:
> On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes...@gmail.com wrote 1.0K 
> bytes in 19 lines about:
> : Clearly brute forcing would be way, way out of the question just based on
> : sheer size. I've read about the introduction points being stored on some
> : type of DHT. Is it possible to access the hash table in order to pull the
> : necessary information for indexing the entire hidden services set? I figure
>
> Is it possible? Yes. I've met some people who tell me they run a relay
> which records every hidden service descriptor. They don't tell me more
> than that. All this tells them is a list of hidden service descriptors
> their relay has seen, not where they are, or maybe not even accessible
> ports.
>
> There are already a few sites trying to index .onionland to
> varying degrees of success. http://ahmia.fi/ is one. Torgle,
> https://github.com/torgle, is another. I would expect some national law
> enforcement or intelligence agency has one as well.
>
We've been thinking for next release of Tor2web 3 to add such a similar
features to facilitate indexing of visited TorHs by 3rd part projects
https://github.com/globaleaks/Tor2web-3.0/issues/19 .

-naif
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to