From 3e5040ef88734488b128b7c48cca38044bb1b36e Mon Sep 17 00:00:00 2001 From: midas Date: Wed, 22 Jan 2025 16:46:49 +0100 Subject: [PATCH] cleanup the rest of the page --- opsec/cloud_provider_adversary/index.html | 47 +++++------------------ 1 file changed, 9 insertions(+), 38 deletions(-) diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index 858ae05..08e6e28 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -133,12 +133,6 @@ in this post we are going to do a threat modelling exercise:

-

-

How can high availability help?

-In the above scenario if the onion service operator had setup a redundant, highly available server then connections would have been seamlessly sent to another server in the redundancy pool, thus preventing the adversary -from extracting location information based on their operation. This works best with a server in a different country or region, making a coordinated attack by several adversaries a requirement in order to use this method for deanonymization. - -

@@ -149,41 +143,18 @@ from extracting location information based on their operation. This works best w
-

-

Adversary Attack Flow

-Below is a chart depicting an adversary attack flow. As shown, high availability will prevent the adversary from progressing beyond their initial step of uptime-based target acquisition. -
-
- -
-As you can see the adversarie's playbook is quite simple: -

-
    -
  1. Identify a list of potential suspects
  2. -
  3. Cut them off the internet
  4. -
  5. Check whether this action made the hidden service unreachable
  6. -
+ +
+
+
+
-Those actions are easily perpetrated by law enforcement as they only require:
- -
-Both of those are trival to obtain for LEOs (law enforcement officers). - -

- - - -
-This Diagram shows where the attack takes place and how a redundant setup prevent such attacks from confirming the physical location of the hidden service. -
-
-In conclusion, your hidden service is one downtime away from having its location disclosed to an adversary, so you need to make sure it has High Availability -

+
+
+
+