Answer the question
In order to leave comments, you need to log in
Responsibility for hacking an onion resource?
Naive question, but still.
As I understand it, there is no legal regulation in the Tor network.
But does this guarantee complete anarchy?
Let's say there is some onion resource. When studying it, vulnerabilities were identified, access was gained to the tor-hidden-server on the user's local machine. Can the provider of the explorer and the owner of the local machine with the onion resource try to prosecute the breach in such a situation?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question