Adversary Attack Flow
Below is a chart depicting an adversary attack flow. As shown, high availability will prevent the adversary from progressing beyond their initial step of uptime-based target acquisition.
As you can see the adversarie's playbook is quite simple:
- Identify a list of potential suspects
- Cut them off the internet
- Check whether this action made the hidden service unreachable
Those actions are easily perpetrated by law enforcement as they only require:
- DSLAM level access to the internet backbone used by the suspects (impacting a perimeter like a city block)
- City block level access to the power grid in order to run disruptive actions
Both of those are trival to obtain for LEOs (law enforcement officers).
This Diagram shows where the attack takes place and how a redundant setup prevent such attacks from confirming the physical location of the hidden service.
In conclusion, your hidden service is one downtime away from having its location disclosed to an adversary, so you need to make sure it has High Availability