Delivery-Date: Thu, 31 Mar 2016 11:50:29 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,
	RCVD_IN_BL_SPAMCOP_NET,RCVD_IN_DNSWL_MED,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A56C11E08B9;
	Thu, 31 Mar 2016 11:50:27 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3E19C3A055;
	Thu, 31 Mar 2016 15:50:25 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 3E6A339F77
 for <tor-talk@lists.torproject.org>; Thu, 31 Mar 2016 15:50:21 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 5q5BvtcvUiQy for <tor-talk@lists.torproject.org>;
 Thu, 31 Mar 2016 15:50:21 +0000 (UTC)
Received: from plane.gmane.org (plane.gmane.org [80.91.229.3])
 (using TLSv1 with cipher AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 06EED398DB
 for <tor-talk@lists.torproject.org>; Thu, 31 Mar 2016 15:50:20 +0000 (UTC)
Received: from list by plane.gmane.org with local (Exim 4.69)
 (envelope-from <gno-or-talk-2@m.gmane.org>) id 1alerO-0000dX-Fm
 for tor-talk@lists.torproject.org; Thu, 31 Mar 2016 17:50:14 +0200
Received: from relay1.cavefelem.com ([37.59.123.142])
 by main.gmane.org with esmtp (Gmexim 0.1 (Debian))
 id 1AlnuQ-0007hv-00
 for <tor-talk@lists.torproject.org>; Thu, 31 Mar 2016 17:50:14 +0200
Received: from lukep by relay1.cavefelem.com with local (Gmexim 0.1 (Debian))
 id 1AlnuQ-0007hv-00
 for <tor-talk@lists.torproject.org>; Thu, 31 Mar 2016 17:50:14 +0200
X-Injected-Via-Gmane: http://gmane.org/
To: tor-talk@lists.torproject.org
From: lukep <lukep@tutanota.com>
Date: Thu, 31 Mar 2016 15:49:55 +0000 (UTC)
Lines: 16
Message-ID: <loom.20160331T173550-5@post.gmane.org>
References: <c804de8bed012b97411a8d8f58db4c3c@cannon-ciota.info>
Mime-Version: 1.0
X-Complaints-To: usenet@ger.gmane.org
X-Gmane-NNTP-Posting-Host: sea.gmane.org
User-Agent: Loom/3.14 (http://gmane.org/)
X-Loom-IP: 37.59.123.142 (Mozilla/5.0 (Windows NT 6.1;
 rv:38.0) Gecko/20100101 Firefox/38.0)
Subject: Re: [tor-talk] Operation Onymous Technical Explanation?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

CANNON NATHANIEL CIOTA <cannon <at> cannon-ciota.info> writes:

> 
> Seeking technical information on how hidden services were de anonymized 
> and what updates to HS protocol was applied as a mitigation.
> Thanks,


<speculation> If the attacker can take control of both the guard node of a
hidden service and it's rendezvous point then they can do a traffic
correlation attack to find the IP of the hidden service. If you're running a
hidden service you can mitigate against this by choosing a relay you trust.
Next generation hidden services are being worked on in Prop 224
(https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt)

-- lukep

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

