FINDING · DEFENSE
CenTor protects origin onion service operators from DoS and deanonymization by routing all client traffic through geographically distributed Bento replicas running inside SGX-based Trusted Execution Environments (TEEs). The original operator can go fully offline after deploying static content; replicas enforce confidentiality and integrity of hosted content with ephemeral per-enclave encryption keys, preventing malicious Bento node operators from inspecting or modifying content even if they control the underlying hardware.
From 2025-arora-improving-performance-security — Improving the Performance and Security of Tor's Onion Services · §3.1, §5.3 · 2025 · PoPETs 2025
Implications
- Tor bridge operators hosting sensitive circumvention services should consider TEE-backed replica deployment to insulate origin infrastructure from both DoS and location-exposure attacks—the origin can remain dark while replicas serve traffic.
- For circumvention services requiring operator anonymity (whistleblowing platforms, dissident communication), combining non-anonymous replica hosting with TEE-enforced content isolation offers a practical CDN-style DoS defense without trusting third-party replica operators with plaintext content.
Tags
Extracted by claude-sonnet-4-6 — review before relying.