On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes...@gmail.com wrote 1.0K bytes in 19 lines about: : Clearly brute forcing would be way, way out of the question just based on : sheer size. I've read about the introduction points being stored on some : type of DHT. Is it possible to access the hash table in order to pull the : necessary information for indexing the entire hidden services set? I figure
Is it possible? Yes. I've met some people who tell me they run a relay which records every hidden service descriptor. They don't tell me more than that. All this tells them is a list of hidden service descriptors their relay has seen, not where they are, or maybe not even accessible ports. There are already a few sites trying to index .onionland to varying degrees of success. http://ahmia.fi/ is one. Torgle, https://github.com/torgle, is another. I would expect some national law enforcement or intelligence agency has one as well. -- Andrew http://tpo.is/contact pgp 0x6B4D6475 _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk