Groups | Search | Server Info | Login | Register
Groups > comp.protocols.tcp-ip > #1165
| From | "Anonymous Remailer (austria)" <mixmaster@remailer.privacy.at> |
|---|---|
| Subject | Onionflation attacks on Tor network |
| Message-ID | <d9c3ed1b28af31a513b9effc29ad6e4f@dizum.com> (permalink) |
| Date | 2026-03-02 01:06 +0100 |
| Newsgroups | alt.cypherpunks, alt.privacy, alt.privacy.anon-server, comp.protocols.tcp-ip, si.comp.protocols.tcp-ip |
| Organization | dizum.com - The Internet Problem Provider |
Cross-posted to 5 groups.
2600 - The Hacker Quarterly · Andrew Strutt · Admin · 4h · A group of security researchers just developed a new family of attacks dubbed OnionFlation, that turn tors denial of service defense mechanism against its own users. This enables attackers to essentially bring down any onion service of their choosing. This class of attacks actually takes advantage of an asymmetry in onion routing, which reveals a persistent issue facing the tor network. As a result, these types of attacks are difficult to properly patch or defend against. I use my own Onion Service to demonstrate the principals of this attack in real time. https://www.usenix.org/conference/usenixsecurity25/presentation/lee https://www.facebook.com/groups/2600net/posts/4482651051957985/
Back to comp.protocols.tcp-ip | Previous | Next — Next in thread | Find similar
Onionflation attacks on Tor network "Anonymous Remailer (austria)" <mixmaster@remailer.privacy.at> - 2026-03-02 01:06 +0100 Re: Onionflation attacks on Tor network Anonymous User <noreply@dirge.harmsk.com> - 2026-03-02 01:20 -0500
csiph-web