FINDING · DEFENSE

CenTor protects origin onion service operators from DoS and deanonymization by routing all client traffic through geographically distributed Bento replicas running inside SGX-based Trusted Execution Environments (TEEs). The original operator can go fully offline after deploying static content; replicas enforce confidentiality and integrity of hosted content with ephemeral per-enclave encryption keys, preventing malicious Bento node operators from inspecting or modifying content even if they control the underlying hardware.

From 2025-arora-improving-performance-securityImproving the Performance and Security of Tor's Onion Services · §3.1, §5.3 · 2025 · PoPETs 2025

Implications

Tags

censors
generic
techniques
active-probingflow-correlation
defenses
torbridges

Extracted by claude-sonnet-4-6 — review before relying.