On Fri, Apr 11, 2014 at 6:19 PM, Cyrus <[email protected]> wrote:
> My hidden service address may have been compromised in Heartbleed. I > can't seem to reach my own hidden service most of the time. Other > services I hope so far seem unaffected. I am curious what happens if the > same private key is used by someone else, and how an attacker might use > a private key to disable a hidden service. I am currently switching to a > new key as a precaution. Information would be greatly appreciated, > because I think someone is blocking my hidden service somehow. > i wonder how hard it would be to try and fetch *all* of a hidden service's descriptors (not "try and fetch the first one i can get"), and then to compare them. one would either need to patch tor itself, or one could do it via Stem, but they would need to do the fetching itself via a tor circuit. might be a useful diagnostic tool/thingie, hm. -- Kostas. 0x0e5dce45 @ pgp.mit.edu -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
