Hacker News new | past | comments | ask | show | jobs | submit login

I mean Tor itself. It uses TLS to connect securely to the nodes.

The code includes a list of Directory Servers, along with the fingerprints of their certs[1], so those are pinned. Then the relays are fetched from a Directory Server, along with their own fingerprints. So those connections are also authenticated.

[1] https://oniongit.eu/dgoulet/tor/blob/42cee727fa281fff4e27f98...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: