On Monday, October 10, 2011 13:54:19 [email protected] wrote: > I just heard that if the private_key file of your hidden service would have > gotten in the hands of an attacker, he could have located your hidden > service just like that. I just wonder how that can be done, since it's just > a file with encrypted code in it.
I wonder where you hear such things. If the attacker has your private key, you've lost. Your system is compromised and the attacker can now run the hidden service. -- Andrew pgp 0x74ED336B _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
