174
submitted 1 year ago by zquestz@lemm.ee to c/privacy@lemmy.ml

A new DoS protection mechanism for Tor leveraging Proof-of-Work.

all 18 comments
sorted by: hot top controversial new old
[-] huginn@feddit.it 45 points 1 year ago

Man the comments section on the tor project blog are just as smooth brained as YouTube comments sections.

I kinda expected better of the average reader than commenting "hmm another captcha" 6 hours after they explicitly clarified this isn't visible to the user (which was also implicit in the whole 30ms time specified).

Like 10 points for reading the article but -30 for reading comprehension.

[-] fogetaboutit@programming.dev 25 points 1 year ago

Huh, who wouldve thought this is how PoW would actually be used

[-] eager_eagle@lemmy.world 15 points 1 year ago* (last edited 1 year ago)

The creators, actually.

The concept was invented by Moni Naor and Cynthia Dwork in 1993 as a way to deter denial-of-service attacks and other service abuses such as spam on a network by requiring some work from a service requester.

[-] mp3@lemmy.ca 14 points 1 year ago

At least it's only used when the server is getting stressed.

[-] WhatAmLemmy@lemmy.world 23 points 1 year ago

This is a pretty excellent use case for PoW. I could see this being adopted by other DDoS services, server stacks, and eventually make its way into openwrt, pfsense etc.

[-] RobotToaster@infosec.pub 11 points 1 year ago* (last edited 1 year ago)
[-] Atemu@lemmy.ml 15 points 1 year ago

This one, however, is built right into the protocol.

[-] shortwavesurfer@monero.town 6 points 1 year ago

Sweet! This will help things like dread for sure.

[-] Treczoks@lemm.ee 1 points 1 year ago

The article is quite vague on how this is implemented. Does it require JS to be activated to work? That would be a big NO for anyone really looking into privacy, but could work for those who use TOR basically as a free VPN to escape stupid geoblocking rules.

And what will prevent DDOSers from just creating dummy requests without the intention to ever wanting to solve any PoWs? It will still allocate resources on the other side.

[-] ZickZack@kbin.social 12 points 1 year ago

No, it's built into the protocol: think of it like as if every http request forces you to attach some tiny additional box containing the solution to a math puzzle.

The twist is that you want the math puzzle to be easy to create and verify, but hard to compute. The harder the puzzle you solve, the more you get prioritized by the service that sent you the puzzle.

If your puzzle is cheaper to create than hosting your service is, then it's much harder to ddos you since attackers get stuck at the puzzle, rather than getting to your expensive service

[-] Treczoks@lemm.ee 1 points 1 year ago

Ah, ok. that clarifies it.

this post was submitted on 24 Aug 2023
174 points (98.3% liked)

Privacy

32517 readers
110 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS