[tor-talk] General question regarding tor, ssl and .onion.
Seth David Schoen
schoen at eff.org
Sun Aug 9 01:04:19 UTC 2015
Jeremy Rand writes:
> It's theoretically possible to use naming systems like Namecoin to
> specify TLS fingerprints for connections to Tor hidden services, which
> would eliminate the need for a CA. I'm hoping to have a proof of
> concept of such functionality soon.
Is there a way to prevent an attacker from simply claiming the same
identifier in Namecoin before the actual hidden service operator does?
--
Seth Schoen <schoen at eff.org>
Senior Staff Technologist https://www.eff.org/
Electronic Frontier Foundation https://www.eff.org/join
815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107
More information about the tor-talk
mailing list