

The attacker sends crafted signals to speed up discovery of entry guards, which are first-hop routers on circuits, or use congestion attacks to bias entry guard selection towards colluding entry guards. While they have shown their effectiveness, they all assume an active at- tacker model.

“To examine the security of the design of hidden services, a handful of attacks have been proposed against them. “Over the past few years, hidden services have witnessed various active attacks in the wild, resulting in several takedowns,” the researchers noted. In theory, it should be impossible to discover their true location, but in practice, there are attacks, such as this latest one, that could “uncloak” them. Hidden services are servers configured to receive inbound connections only through Tor, and can be accessed via their.

A group of MIT researchers have devised two attacks that could identify, with a high degree of certainty (88%), an anonymous hidden service or client.
