[tor-talk] How to identify owners of .onion services?

2014-07-01 Thread williamwinkle
With all the talk about the N_S_A targeting traffic between exit nodes and destination websites, I am wondering how this may work for hidden services (.onion domains). There are no exit nodes as everything occurs within the hidden services network. How would it be possible for an adversary t

Re: [tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

2014-07-01 Thread williamwinkle
On 2014-06-30 22:33, Geoff Down wrote: On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote: But how can the person's computer be identified since all that is seen is the connection between the exit node and the destination target_website.com The point, surely, is that real time code inj

Re: [tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

2014-07-01 Thread williamwinkle
On 2014-06-29 06:22, Roger Dingledine wrote: On Sat, Jun 28, 2014 at 09:38:05PM +, williamwin...@openmailbox.org wrote: I don't understand what Schneier means by this: "After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect

[tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

2014-06-28 Thread williamwinkle
I recently read a Guardian article from last October (www.theguardian.com/world/2013/oct/04/tor-attacks-cnsa-users-online-anonymity) by Bruce Schneier about the N_S_A and Tor. His story was based on the "Tor Stinks" and "Egotistical Giraffe" presentations. My understanding of the article is th