[tor-talk] How to identify owners of .onion services?
williamwinkle at openmailbox.org
williamwinkle at openmailbox.org
Wed Jul 2 05:10:51 UTC 2014
With all the talk about the N_S_A targeting traffic between exit nodes
and destination websites, I am wondering how this may work for hidden
services (.onion domains). There are no exit nodes as everything occurs
within the hidden services network.
How would it be possible for an adversary to learn that Person X rented
a Tor hidden server from a hosting company that provided .onion domains
and hosting (assuming that Person X paid for his/her hosting with
Bitcoins and did not do anything stupid to tie his or her 'clear web'
identity to his or her .onion identity)?
More information about the tor-talk
mailing list