Hello, Let's say Alice is a political opponent in a repressive regime. Alice hosts his blog as a tor hidden service hosted at home.
The government knows about the blog and monitor it. It also monitor the internet at a nation scale. Case 1 : the government dosen't suspect any individual of being behind the blog At 3 AM, the government start periodic flooding the hidden service, with an unique pattern (e.g. flood 5 minutes, wait 6 minutes, flood 13 minutes, wait 2 minutes, flood 7 minutes ect.). The government should be abe to get a very short list of suspects from a bandwidth usage analysis. Go to case 2. Case 2 : Alice is on a short list of suspects. The government cut the Alice's internet access (or the electricity or her house) and see what happen with the hidden service. Looks easy no ? Any way for Alice to mitigate such attacks ? Two nodes hosting the same .onion in diffrent locations ? Something else ? HardKor _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
