On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen <[email protected]> wrote: > ... > Does anyone have theories about this part right at the bottom? .. > /** > * Placeholder fingerprint for Tor hidden service addresses. > * Real fingerpritns will be fired by the plugins > * 'anonymizer/tor/plugin/onion/*'... > fingerprint('anonymizer/tor/hiddenservice/address') = nil;
this says to me "we used to directly implement linking processes at print "... hiddenservice/address" but now we have improved our infrastructure of XKS workflow to abstract plugin interfaces of which this functionality is now implemented as "... plugin/onion". > Does this suggest anything interesting about the ability to determine > either the physical location of a hidden service's service or instances > of people accessing a hidden service? directories and authorities being of interest is interesting ;) best regards, -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
