] Hidden service security w. Apache/Win32
On 2012-02-19 19:58 CET, Ondrej Mikle wrote: Addendum for truly
uberparanoid installation: [various best practices] With the
uberparanoid installation, the greatest risk is a return-to-libc-style attack
on Tor where attacker instructs Tor to make
Is the time sync spoofing even applicable to hidden services?
How can the MS time server tampering with the exit nodes be applicable to
hidden services?
It has nothing to do directly with Apache or the hidden service.
For correct operation Tor needs the correct time and date. Windows will
On Feb 20, 2012, at 8:57 PM, Ondrej Mikle wrote:
On 02/20/2012 05:06 PM, Ralf-Philipp Weinmann wrote:
On 2012-02-19 19:58 CET, Ondrej Mikle wrote:
Addendum for truly uberparanoid installation:
[various best practices]
With the uberparanoid installation, the greatest risk is a
On 02/20/2012 05:06 PM, Ralf-Philipp Weinmann wrote:
On 2012-02-19 19:58 CET, Ondrej Mikle wrote:
Addendum for truly uberparanoid installation:
[various best practices]
With the uberparanoid installation, the greatest risk is a
return-to-libc-style
attack on Tor where attacker instructs
On Sun, 19 Feb 2012 12:50:47 -
Fred Toben red...@tormail.net wrote:
Hello Everybody
I am in the process of setting up a hidden service with Apache 2.2
under Windows.
I run Apache (Win32) in a virtual machine and Tor in a separate
virtual machine under VMware Workstation.
VM 1 runs
It would be very dangerous to use Windows in any way for running hidden
services! Run Linux and VirtualBox on your host machine. Ubuntu is
probably best if you're new to Linux. Have your host machine access the
Internet through a reputable multi-hop VPN service, and firewall it to
prevent