The original Dockerfile was sent to me by someone going by the name "aToo", he agreed with my idea to release it as an open source. The image is designed to complement docker-tor-hidden-service image, the only requirement being open ControlPort.
Please, consider linking to this project from your README, as it substantially lowers a risk of Guard node discovery when running a Tor hidden service.
We believe that the most serious threat that v3 onion services currently face is guard discovery. A guard discovery attack enables an adversary to determine the guard node(s) that are in use by a Tor client and/or Tor onion service. Once the guard node is known, traffic analysis attacks that can deanonymize an onion service (or onion service user) become easier.
I am sporadical maintainer of docker-vanguards https://github.com/onionltd/docker-vanguards.
Vanguards is a privacy enhancing addon for Tor hidden services. You can read more about it here: https://blog.torproject.org/announcing-vanguards-add-onion-services
The original Dockerfile was sent to me by someone going by the name "aToo", he agreed with my idea to release it as an open source. The image is designed to complement docker-tor-hidden-service image, the only requirement being open
ControlPort
.Please, consider linking to this project from your README, as it substantially lowers a risk of Guard node discovery when running a Tor hidden service.
The use case is described in https://github.com/onionltd/docker-vanguards/blob/master/docker-compose.yaml.
Oh there's also this issue: https://github.com/onionltd/docker-vanguards/issues/1