[tor-talk] Hidden services home hosting

HardKor hardkor.info at gmail.com
Mon Nov 12 13:27:22 UTC 2012


Hello,

Let's say Alice is a political opponent in a repressive regime. Alice hosts
his blog as a tor hidden service hosted at home.

The government knows about the blog and monitor it. It also monitor the
internet at a nation scale.

Case 1 : the government dosen't suspect any individual of being behind the
blog

At 3 AM, the government start periodic flooding  the hidden service, with
an unique pattern (e.g. flood 5  minutes, wait 6 minutes, flood 13 minutes,
wait 2 minutes, flood 7 minutes ect.).

The government should be abe to get a very short list of suspects from a
bandwidth usage analysis. Go to case 2.

Case 2 : Alice is on a short list of suspects.

The government cut the Alice's internet access (or the electricity or her
house) and see what happen with the hidden service.

Looks easy no ?
Any way for Alice to mitigate such attacks ?
Two nodes hosting the same .onion in diffrent locations ?
Something else ?

HardKor


More information about the tor-talk mailing list