Thanks Matthew!
So stealth makes onions really hidden by encrypting the list of intro
points. Nobody knows how many hidden services are out there. Great!
-Juha
On Sun, Aug 7, 2016 at 5:08 AM, Matthew Finkel
wrote:
> On Sat, Aug 06, 2016 at 10:24:53AM +0300, Nurmi, Juha wrote:
> > Hi,
> >
> >
On Sat, Aug 06, 2016 at 10:24:53AM +0300, Nurmi, Juha wrote:
> Hi,
>
> I have been playing with stealth onion services[1] to protect some of my
> SSH servers from SSH MITM. I like to keep my servers as hidden as possible.
>
> Great to have this option on Tor :) I have some questions about it and
tort...@nym.hush.com:
> Thanks for the reply, Flipchan. Ok, I am no expert with this but had a
> look at lsof (mac equivalent of netstat) and it doesn't look like this
> is the problem. I'm attaching a screencap; the first test is before
> running Tor, the second is right after getting the error me
Thanks for the reply, Flipchan. Ok, I am no expert with this but had a look at
lsof (mac equivalent of netstat) and it doesn't look like this is the problem.
I'm attaching a screencap; the first test is before running Tor, the second is
right after getting the error message. If I'm not mistaken
ban...@openmailbox.org:
> Besides password re-use from non-anonymous accounts (which password
> managers deal with), writing style (Anonymouth is supposed to deal with
> that - openjdk support in progress), Re-using a non-anonymous username
> by mistake is a remaining problem.
Great!
Now everybod
Hi,
I have been playing with stealth onion services[1] to protect some of my
SSH servers from SSH MITM. I like to keep my servers as hidden as possible.
Great to have this option on Tor :) I have some questions about it and I
didn't find much information.
Could someone tell me how it actually fu