28.07.2016 Views

Understanding Tor Onion Services and Their Use Cases

HOPE2016-Tor_onion_services

HOPE2016-Tor_onion_services

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Guard Discovery Attack (1/2)<br />

Attacker wants to learn the guard of an onion service, <strong>and</strong> has<br />

signed up a few middle relays on the network:<br />

●<br />

The attacker can force the onion service to create <strong>Tor</strong> circuits.<br />

●<br />

The attacker can figure out if her middle node was picked on a<br />

circuit.<br />

Attacker learns guard node in use

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!