Groups | Search | Server Info | Login | Register
Groups > si.comp.protocols.tcp-ip > #1
| From | "Anonymous Remailer (austria)" <mixmaster@remailer.privacy.at> |
|---|---|
| Subject | Onionflation attacks on Tor network |
| Message-ID | <d9c3ed1b28af31a513b9effc29ad6e4f@dizum.com> (permalink) |
| Date | 2026-03-02 01:06 +0100 |
| Newsgroups | alt.cypherpunks, alt.privacy, alt.privacy.anon-server, comp.protocols.tcp-ip, si.comp.protocols.tcp-ip |
| Organization | dizum.com - The Internet Problem Provider |
Cross-posted to 5 groups.
2600 - The Hacker Quarterly · Andrew Strutt · Admin · 4h · A group of security researchers just developed a new family of attacks dubbed OnionFlation, that turn tors denial of service defense mechanism against its own users. This enables attackers to essentially bring down any onion service of their choosing. This class of attacks actually takes advantage of an asymmetry in onion routing, which reveals a persistent issue facing the tor network. As a result, these types of attacks are difficult to properly patch or defend against. I use my own Onion Service to demonstrate the principals of this attack in real time. https://www.usenix.org/conference/usenixsecurity25/presentation/lee https://www.facebook.com/groups/2600net/posts/4482651051957985/
Back to si.comp.protocols.tcp-ip | Find similar
Onionflation attacks on Tor network "Anonymous Remailer (austria)" <mixmaster@remailer.privacy.at> - 2026-03-02 01:06 +0100
csiph-web