Score:0

Prove a response was received from the particular Tor hidden service

gp flag

Consider a Tor hidden service. I want to retrieve the main page of such website in such a way that I can later prove to a skeptical third party that the website with this certificate (identified by the public key in the address) provided me with this exact HTML page.

Is this possible assuming the website does not install additional software and is just a normal website on the Darknet?

I know this cannot be done with SSL/TLS ( How can you prove that a certain file was downloaded from a certain website? ), how does the situation look within Tor?

chargerbottle avatar
gp flag
I could not add the `tor` tag due to my low reputation as a new user.
Score:0
in flag

That is not possible, except with some help from the website administrators, as suggested in the answer here.

TOR gives us some browsing anonymization; so, it doesn't give you any non-repudiation. BTW, how could you demonstrate the chain of proxies used to download the website metadata was not emulated by you? We always can emulate a chain of proxies that is indistinguishable from a real one. So, any claim about their validity would be non-credible.

I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.