Quoth Mike Perry:
> If you're talking about attacks as strong as end-to-end correlation,
> then it turns out hidden services have similar weaknesses on that order.
> There are a number of points where the adversary can inject themselves
> either to observe or manipulate hidden service circuit construction.
> 
> ...

Many thanks Mike for the detailed response; I wasn't aware of this 
work.

> Still, despite all of this, I still think hidden services have an
> important roll to play in Tor. The search engines of today just aren't
> the proper use case for them right now.

That makes sense. Hidden services are still obviously important for 
running servers that can't safely reveal their location, anyway.

Thanks again.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to