+
+
Adversary Attack Flow
+Below is a chart depicting an adversary attack flow. As shown, high availability will prevent the adversary from progressing beyond their initial step of uptime-based target acquisition.
+
+
+

+
+
+As you can see the adversarie's playbook is quite simple:
+
+
+ - Identify a list of potential suspects
+ - Cut them off the internet
+ - Check whether this action made the hidden service unreachable
+
+
+
+Those actions are easily perpetrated by law enforcement as they only require:
+
+ - DSLAM level access to the internet backbone used by the suspects (impacting a perimeter like a city block)
+ - City block level access to the power grid in order to run disruptive actions
+
+
+Both of those are trival to obtain for LEOs (law enforcement officers).
+
+
+
+

+
+
+This Diagram shows where the attack takes place and how a redundant setup prevent such attacks from confirming the physical location of the hidden service.
+
+
+
In conclusion, your hidden service is one downtime away from having its location disclosed to an adversary, so you need to make sure it has High Availability
+
+
+