[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Hidden services home hosting



Hello,

Let's say Alice is a political opponent in a repressive regime. Alice hosts
his blog as a tor hidden service hosted at home.

The government knows about the blog and monitor it. It also monitor the
internet at a nation scale.

Case 1 : the government dosen't suspect any individual of being behind the
blog

At 3 AM, the government start periodic flooding  the hidden service, with
an unique pattern (e.g. flood 5  minutes, wait 6 minutes, flood 13 minutes,
wait 2 minutes, flood 7 minutes ect.).

The government should be abe to get a very short list of suspects from a
bandwidth usage analysis. Go to case 2.

Case 2 : Alice is on a short list of suspects.

The government cut the Alice's internet access (or the electricity or her
house) and see what happen with the hidden service.

Looks easy no ?
Any way for Alice to mitigate such attacks ?
Two nodes hosting the same .onion in diffrent locations ?
Something else ?

HardKor
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk