On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen <[email protected]> wrote:
> ...
> Does anyone have theories about this part right at the bottom? ..
>    /**
>     * Placeholder fingerprint for Tor hidden service addresses.
>     * Real fingerpritns will be fired by the plugins
>     *   'anonymizer/tor/plugin/onion/*'...
>    fingerprint('anonymizer/tor/hiddenservice/address') = nil;

this says to me "we used to directly implement linking processes at
print "... hiddenservice/address" but now we have improved our
infrastructure of XKS workflow to abstract plugin interfaces of which
this functionality is now implemented as "... plugin/onion".



> Does this suggest anything interesting about the ability to determine
> either the physical location of a hidden service's service or instances
> of people accessing a hidden service?

directories and authorities being of interest is interesting ;)


best regards,
-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to