On Sat, Sep 15, 2012 at 11:19 AM, grarpamp wrote:
> rend-spec...
> "permanent-id" is the permanent identifier of the hidden service,
> consisting of 80 bits. It can be calculated by computing the hash value
> of the public hidden service key and truncating after the first 80 bits:
> permanent-id
Hi dear TOR users! Thanks for creating and maintaining TOR community ! I just
subscribed to the mail list.
I am using Tor browser bundle and today the start page suggested a security
update.
After I downloaded it and went to the usual address to watch the page I saw the
browser tries to downlo
I'm sure this has been asked on here before but:
Is it "possible" to basically brute force tor hidden services by simply
visiting every possible .onion address and then indexing the ones that are
active? Yes all 32^16 possibilities.. Is there possibly another way to do
this? Perhaps by contacting
On Sep 17, 2012, at 12:19 AM, Scurvy Scott wrote:
> I'm sure this has been asked on here before but:
>
> Is it "possible" to basically brute force tor hidden services by simply
> visiting every possible .onion address and then indexing the ones that are
> active? Yes all 32^16 possibilities.. Is
Clearly brute forcing would be way, way out of the question just based on
sheer size. I've read about the introduction points being stored on some
type of DHT. Is it possible to access the hash table in order to pull the
necessary information for indexing the entire hidden services set? I figure
th
I keep reading on the .onion forums about the trafic and the dislike
for some *other* communities.
But, on the other hand the key to that privacy is to have more trafic.
If all guys in States do their porn shopping on clearnet and all the
guys in Iran do get their porn thorugh Tor, that could lead