On 8/06/12 9:53 AM, Matthew Kaufman wrote:
Great questions. And does hosting a hidden service exposé the machine to
penetration attacks?
Yes, if those services are vulnerable whether they're running as a Tor
service or not.
The other concern is that hidden services expose information about the
system that the hidden service is running on, i.e. a http server that
lists the operating system that it's running on, or a daemon that shows
the location that the hidden service is running on.
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk