[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Hidden services home hosting
Hello,
Let's say Alice is a political opponent in a repressive regime. Alice hosts
his blog as a tor hidden service hosted at home.
The government knows about the blog and monitor it. It also monitor the
internet at a nation scale.
Case 1 : the government dosen't suspect any individual of being behind the
blog
At 3 AM, the government start periodic flooding the hidden service, with
an unique pattern (e.g. flood 5 minutes, wait 6 minutes, flood 13 minutes,
wait 2 minutes, flood 7 minutes ect.).
The government should be abe to get a very short list of suspects from a
bandwidth usage analysis. Go to case 2.
Case 2 : Alice is on a short list of suspects.
The government cut the Alice's internet access (or the electricity or her
house) and see what happen with the hidden service.
Looks easy no ?
Any way for Alice to mitigate such attacks ?
Two nodes hosting the same .onion in diffrent locations ?
Something else ?
HardKor
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk