On 22 April 2017 at 00:35, Alec Muffett <alec.muff...@gmail.com> wrote: > So it turns out that Shodan - a kind of multi-protocol Google-alike search > engine for metadata and protocol headers - has indexed a bunch of Onion > sites which were configured to leak their (onion) hostnames into protocol > headers.
Interesting. What can you do with that? Can you tie them to specific hidden services? -J -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk