Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think that connections to hidden services on the Tor network are encrypted end-to-end.


They are not encrypted at all. Tor provides anonymity (nobody can say where the captured traffic comes from), not encryption (nobody can read my trafic). You should use independent encryption inside Tor.

I2P is similar to Tor, but encrypted AFAIK.


Tor absolutely does provide encryption, except for the last link (unless it's a hidden service) just like the parent poster said. More information is available here:

https://ssd.eff.org/tech/tor

https://www.torproject.org/docs/hidden-services.html.en

EDIT: To be clear, I am saying that tor DOES provide end-to-end encryption, but only when you're using a tor hidden service -- which is also what the parent poster said.


The parent said end-to-end encryption, which Tor does not do. Yes, information through a tor circuit is encrypted. No, it's not enough if you need end-to-end encyption, the participants must arrange independent of tor for that.


But with a hidden service, the last unencrypted bit is all within the same server. It's a very different scenario from accessing the general internet: There's no exit server to worry about, except for the service you're connecting to.


Tor traffic is encrypted all the way through the network until the exit node. However, your point still stands: Use end-to-end encryption (SSL/TLS) to prevent someone at the exit from seeing your traffic.


Yes, they are encrypted, but it's not end-to-end. I should have made my post more clear. If you need end-to-end encyption, participants must explicitly arrange for it independent of Tor.


You're right, connections to Tor hidden nodes are encrypted end-to-end ...but so are SSL sessions over Tor e.g. https://ddg.com




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: