Delivery-Date: Wed, 02 Jul 2014 01:11:59 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1A90B1E0ADF
	for <archiver@seul.org>; Wed,  2 Jul 2014 01:11:58 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AB1352FC82;
	Wed,  2 Jul 2014 05:11:57 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 382F02FC5C
 for <tor-talk@lists.torproject.org>; Wed,  2 Jul 2014 05:10:56 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id k5zWot71ON7U for <tor-talk@lists.torproject.org>;
 Wed,  2 Jul 2014 05:10:56 +0000 (UTC)
Received: from mail.openmailbox.org (mail.openmailbox.org [212.129.10.237])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 08C9E2FAF5
 for <tor-talk@lists.torproject.org>; Wed,  2 Jul 2014 05:10:56 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by mail.openmailbox.org (Postfix) with ESMTP id 381132E033F
 for <tor-talk@lists.torproject.org>; Wed,  2 Jul 2014 07:10:53 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=openmailbox.org;
 h=user-agent:message-id:subject:subject:from:from:date:date
 :content-transfer-encoding:content-type:content-type
 :mime-version:received:received; s=openmailbox; t=1404277851;
 bh=CuBzvScbrAbBtc+nMTieZpY/ySBdqWn4dhXNapXCoPY=; b=X4AsF6pvHyE6
 +hTFI0jHjV+V6/HY46raqAQeLu49IKZ3z9UiWPZyLUWCY//OLVxmtbgAPbAguGft
 UpjULHsDVYNdNO0sXaPWddWi252QmzllybF6FfWUPLR8//XOvh8yjguguCXin7K/
 g+O0hGkEaWsRgTHkhaxKL+3MSFKRHrA=
X-Virus-Scanned: at openmailbox.org
Received: from mail.openmailbox.org ([212.129.10.237])
 by localhost (mail.openmailbox.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id lzbHUZCSUBAM for <tor-talk@lists.torproject.org>;
 Wed,  2 Jul 2014 07:10:51 +0200 (CEST)
Received: from www.openmailbox.org (localhost [127.0.0.1])
 by mail.openmailbox.org (Postfix) with ESMTP id BB2AC2E0301
 for <tor-talk@lists.torproject.org>; Wed,  2 Jul 2014 07:10:51 +0200 (CEST)
MIME-Version: 1.0
Date: Wed, 02 Jul 2014 05:10:51 +0000
From: williamwinkle@openmailbox.org
To: tor-talk@lists.torproject.org
Message-ID: <f0ed32b8cebd1062c60b786d04a9ecf0@openmailbox.org>
X-Sender: williamwinkle@openmailbox.org
User-Agent: Roundcube Webmail/1.0.1
Subject: [tor-talk] =?utf-8?q?How_to_identify_owners_of_=2Eonion_services?=
	=?utf-8?q?=3F?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


With all the talk about the N_S_A targeting traffic between exit nodes 
and destination websites, I am wondering how this may work for hidden 
services (.onion domains). There are no exit nodes as everything occurs 
within the hidden services network.

How would it be possible for an adversary to learn that Person X rented 
a Tor hidden server from a hosting company that provided .onion domains 
and hosting (assuming that Person X paid for his/her hosting with 
Bitcoins and did not do anything stupid to tie his or her 'clear web' 
identity to his or her .onion identity)?

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

