> is it safe so onion IP won't be disclosed?

Whenever someone cuts, dos, or boots the box, it panics,
etc... all sites services on it are correlated together.

Webserver daemon, kernel, and VM exploits exist.

"Safe" means you probably do not want to be running it on
the same box, or account, payment, email, phone, isp line,
anything that is connected to you. Nor managed from your
own location.

"Won't" is bogus because even standalone onion can be
found with some methods. Whitepapers clearly tell people
that some adversaries can and will find an onion IP in time
if they want to. Tor design is unable to prevent that.
Some methods can be offset, others can't.

Those are some answers no one said.

Are whatever ways you choose safe enough for you?
Are some of your adversaries those that can do that?
You'd have to consider things more to know.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to