From 3e5040ef88734488b128b7c48cca38044bb1b36e Mon Sep 17 00:00:00 2001
From: midas
-
-
How can high availability help?
-In the above scenario if the onion service operator had setup a redundant, highly available server then connections would have been seamlessly sent to another server in the redundancy pool, thus preventing the adversary
-from extracting location information based on their operation. This works best with a server in a different country or region, making a coordinated attack by several adversaries a requirement in order to use this method for deanonymization.
-
-
Adversary Attack Flow
-Below is a chart depicting an adversary attack flow. As shown, high availability will prevent the adversary from progressing beyond their initial step of uptime-based target acquisition.
-
-
-
-
-As you can see the adversarie's playbook is quite simple:
-
-
-
+
+
-
-
-
-Both of those are trival to obtain for LEOs (law enforcement officers).
-
-
-
-
-
-
-This Diagram shows where the attack takes place and how a redundant setup prevent such attacks from confirming the physical location of the hidden service.
-
-
-In conclusion, your hidden service is one downtime away from having its location disclosed to an adversary, so you need to make sure it has High Availability
-