On 02.01.2007, at 09:34, Paul Syverson wrote:
On Mon, Jan 01, 2007 at 06:22:52PM +0000, Steven Murdoch wrote:On Tue, Jan 02, 2007 at 01:39:05AM +1100, Wikileaks wrote:Open an onion connection to the hidden service, asking for echos. Now flood each router. If the "ping" is overly delayed, the router is on the hidden path.
This is a special case of the attack described in 5.2 of [1].
Then it seems a further recommendation for hidden server operations is to manually specify guard nodes from a set of high traffic nodes.
Lucky.