On Mon, Jan 08, 2018 at 03:59:25PM -0700, Dave Warren wrote: > Even if Tor didn't supply any relay > statistics, a curious and enterprising individual could "explore" by seeing > what happens to a particular onion when one launches a DoS attack against an > external IP that one believes might be connected to the .onion service.
Yep. If you want to go a step further, check out this paper: https://www.freehaven.net/anonbib/#remote-traffic-pets12 where they investigate inducing congestion on a target IP address to learn *what web page it's loading*. Turns out the attack is only effective in certain situations, but the fact that it's worth taking seriously at all is bad news for the Internet as a whole. --Roger _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
