On 6 March 2018 at 17:54, Michael Jonker <[email protected]> wrote:
> 2) Bisq 's infrastructural backbone runs as a P2P network over TOR > network. Clients talk to each other and there are various hidden services > providing network resources. > At the risk of blowing my own trumpet, I tried writing up suggestions for hardening hidden services to preserve their anonymity: https://github.com/alecmuffett/the-onion-diaries/blob/master/basic-production-onion-server.md ...although the above was written long before I got seriously into EOTK, and into the amazing benefits of using Unix-domain sockets to connect my webservers and tor-daemons. Aside: the benefits of Unix-domain sockets include: - massively increased resistance to socket-table-filling denial-of-onion-service attacks, and faster recovery times - (probably) lower latency - reduced (but not eliminated) risk of IP metadata leakage of internet address, etc, because less reliance on network addresses But between *that* document, and some of the tech in EOTK, there may be some useful hardening tips for you. - alec -- http://dropsafe.crypticide.com/aboutalecm
_______________________________________________ tor-onions mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
