Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Thats not true, its specifically the attacks where they have many nodes, and if they can get on the entry and exit, the've identified that person.


There is no exit to a hidden service...


He ways saying if they breached his box, they still wouldn't be able to identify persons. But they can if they have his box (the exit) and the entry node.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: