On Tue, May 13, 2008 at 8:55 AM, Roger Dingledine <[EMAIL PROTECTED]> wrote:
> ...
>  Finally, while we don't know of any attacks that will reveal the
>  location of a weak-key hidden service, an attacker could derive its
>  secret key and then pretend to be the hidden service.


MITM'ing an .onion; now that's quite a trick...

Reply via email to