[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
flooding attacks to discover hidden services
Does the public nature of tor routers makes hidden services
vulnerable to
discovery using flooding attacks?
Open an onion connection to the hidden service, asking for echos. Now
flood each
router. If the "ping" is overly delayed, the router is on the hidden
path.
Since the rendezvous node is known and the other nodes vary over
time, this will
eventually reveal the entry node.