Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Complete nonsense. You can easily DoS a specific service by flooding it with rendezvous requests.


As I understand, KF have been under attack for quite some time including employing techniques here discussed on this post.

https://blog.torproject.org/cooking-onions-reclaiming-onionb...

If it was easy, I wouldn't expect them to still be online on TOR after all this time.


Onionbalance doesn’t solve anything, the attack remains asymmetric so you’ll have to spend significantly more on hardware than the attacker is.

> If it was easy, I wouldn't expect them to still be online on TOR after all this time.

You seriously overestimate how many people care enough to DDoS kiwifarms.


> You seriously overestimate how many people care enough to DDoS kiwifarms.

Doesn't sound easy to me if you need to get more people to care than they do now.

Just search 'kiwi farms' on Twitter.


People screaming about this stuff on twitter are not ddosing anyone, different demographic.


You should read up on the KiwiFarms DDoS funded by Twitter users after Near. This also includes an attempt to take down their TOR service.


Don’t take everything you read on twitter seriously. At best those people will sign up for some booters.


That's far from "easy" - if it were so simple, people would be able to extort big money from drug markets for doing it.


People are extorting big money from drug markets doing this...

It's very easy, anyone with basic grasp of C can modify the Tor client to do this.


Wrong. It is very easy to mitigate (DoS) attacks on Tor, as long as you're happy to edit the source code.


Go on, how do you plan to do that while remaining compatible with stock tor clients?

It's simply not possible for the server to distinguish between real and malicious rendezvous requests.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: