Are Tor hidden services subject to correlation of availability status to unmask the actual host serving them? If so are such attacks active-only (e.g. attempting to connect) or passive?
-
Show this thread
This question seems critical to uses of Tor hidden services that run on a host with intermittent connectivity (e.g. http://ricochet.im on a mobile device). CC @SarahJamieLewis
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.