sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] Tor hidden service - what's the rationale?


From: Hendrik Grewe
Subject: Re: [Sks-devel] Tor hidden service - what's the rationale?
Date: Sat, 14 Nov 2015 01:15:44 +0100
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0

Hi!

Am 13.11.2015 um 23:20 schrieb Christoph Anton Mitterer:
> Hey.
> 
> Sorry to "complain"... but I don't quite get the rationale behind that
> hidden service thingy for our key servers - at least not as it's seemed
> to be deployed right now.

I would imagine not leaving the tor network through an exit is the benefit.
Why does facebook run a Hidden Service [0]?

There where some thoughts one could create a profile by just looking at
the metadata (from keyserver operator or eavesdropper on the line) while
key-refresh request from a given peer. Thats why tools like parcimonie
[1a/b] where developed. Those use  a new circuit for every single
key-refresh.

Hendrik


[0]
https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
[1a] https://github.com/EtiennePerot/parcimonie.sh
[1b]https://code.openhub.net/file?fid=BbMaEKchr9cDAOVs8ozX5mJ40g8&cid=RfbvTf3fwdw&fp=405976&mp&projSelected=true#L0

-- 
_____________________________________________________________________
Hendrik Grewe                            address@hidden
Public PGP-Key                           http://mypgpkey.b4ckbone.org
PGP-Fingerprint     B8D6 0D8C F5A9 410A 8077 66AE CF08 65D2 0A09 6F7B

PGP-encrypted mails are welcome!
_____________________________________________________________________


Attachment: signature.asc
Description: OpenPGP digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]