Comment by vbezhenar

Comment by vbezhenar a day ago

2 replies

Here's imaginary attack with adversary. Just push as much traffic as possible from many hosts to the given hidden service. Now observe traffic metadata from high level network operators. With enough filtering it should be possible to detect where traffic spike is terminated.

remram 13 hours ago

It would be "terminated" at all the points that can't keep up, way ahead of the hidden service (or even rendez-vous node).