Over the past week, the Tor network has experienced a significant Layer 7 attack targeting major hidden services, including Torzon, Dread, and Archetyp. We want to be transparent about how this affects your connectivity and what we have done to mitigate it.
Understanding the Attack Vector
The attackers are using a sophisticated botnet to flood our entry nodes with "junk" circuit creation requests. This causes the "502 Bad Gateway" or "Timed Out" errors you might have seen. This is not a hack; your funds and data are safe. It is purely a traffic jam.
The Solution: V4 Guard Nodes
We have successfully deployed our proprietary V4 Anti-DDoS Filtering system. Here is what has changed:
- End-of-Circuit Pow: We have introduced a lightweight Proof-of-Work (PoW) challenge that occurs before the page loads. This filters out 99% of bots that cannot solve the mathematical puzzle efficiently.
- Mirror Rotation: Our mirror list is now dynamic. If a specific Onion URL is under heavy load, it is automatically cycled out of the main rotation.
- Captcha Update: We have adjusted the visual captcha difficulty. It is now easier for humans to read but harder for OCR (Optical Character Recognition) bots to solve.