From the link, since I think this is the part most equivalent to DNS.
The Onion Service assembles an Onion Service descriptor, containing a list of its introduction points (and “authentication keys”), and signs this descriptor with the Onion Service’s identity private key.
The Onion Service upload that signed descriptor to a distributed hash table, which is part of the Tor network, so that clients can also get it.
trolololol@lemmy.world 4 months ago
What prevents me from doing all of that with a pre existing domain that belongs to a competitor?
If you get a state sponsored actor could it overtake things by brute force?
I am imagining this distributed nature of tor is similar to crypto currencies, where if you convince a big enough part of the network that an event did happen, for all practical purposes it’s as if it did happen.