Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Here's imaginary attack with adversary. Just push as much traffic as possible from many hosts to the given hidden service. Now observe traffic metadata from high level network operators. With enough filtering it should be possible to detect where traffic spike is terminated.


It would be "terminated" at all the points that can't keep up, way ahead of the hidden service (or even rendez-vous node).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: