On Thu, 05 Mar 2015 11:27:08 +0000, George Kadianakis wrote: ... > FWIW, none of the above will actually help against a non-experienced > user that uses tor2web to connect to an onion by mistake. Even with HS > authorization or HTTP auth, the onion will forever be imprinted on > that public list.
That's arguably a design problem of the hidden services - you can't stop this from leaking, only slow it down. I was pretty surprised once to see accesses to an unpublished hidden servive. Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds <torvalds@*.org> Date: Fri, 22 Jan 2010 07:29:21 -0800 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk