On 8/06/12 9:53 AM, Matthew Kaufman wrote:
Great questions.  And does hosting a hidden service exposé the machine to
penetration attacks?
Yes, if those services are vulnerable whether they're running as a Tor service or not.

The other concern is that hidden services expose information about the system that the hidden service is running on, i.e. a http server that lists the operating system that it's running on, or a daemon that shows the location that the hidden service is running on.

_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to