[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Operation Onymous Technical Explanation?



CANNON NATHANIEL CIOTA <cannon <at> cannon-ciota.info> writes:

> 
> Seeking technical information on how hidden services were de anonymized 
> and what updates to HS protocol was applied as a mitigation.
> Thanks,


<speculation> If the attacker can take control of both the guard node of a
hidden service and it's rendezvous point then they can do a traffic
correlation attack to find the IP of the hidden service. If you're running a
hidden service you can mitigate against this by choosing a relay you trust.
Next generation hidden services are being worked on in Prop 224
(https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt)

-- lukep

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk