Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

TOR Hidden Services seek funding to defeat denial of service attacks

by The Gurus
April 2, 2015
in Top 10 Stories
Share on FacebookShare on Twitter

Sites hosted on Tor, known as Hidden Services, have been targeted by denial of service (DoS) attacks, where large amounts of traffic is sent to a web server, making access slow or impossible. Narcotics bazaars were just some of many to have suffered.
 
Owners of Hidden Services started complaining about accessibility issues last week. On 23 March, Darren Martyn, a researcher and former LulzSec member running his own Hidden Services, said Tor relays, which are employed to divert users’ traffic to hide their original internet identity, were crashing. He also saw a spike in processor usage in the machines handling his sites.
 
Help is on the way for everyone running Hidden Services. Earlier this week, the Tor Project confirmed it is to crowdfund the creation of Hidden Services software. “We want to make it much harder to DoS Hidden Services. We also want to build some very cool things, like a software development kit (SDK) so that people can build Hidden Services – and Tor – into mobile apps.”
 
The Project hopes instability of Hidden Services will be countered as a result of the community effort. These privacy-focused sites go up and down frequently, which is partly responsible for the wildly different figures cited for the number of Hidden Services running on Tor. Christopher White, who is heading up the MEMEX search project at Darpa, otherwise known as the Defense Advanced Research Projects Agency, told FORBES the initiative has found there are between 10,000 and 30,000 active Hidden Services running every day (the research is not yet complete). Previous figures had been as low as 1,000 and as high as 45,000.
 
FULL STORY

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Illinois university investigates breach

Next Post

Users did not change passwords in Heartbleed fallout

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information