Hey community, we are publishing this post to let users know beforehand that there are scammers running fake clones of our service. Do not access any website that claims to be us, but is not one of our main addresses.
Correct addresses:
-
trocador.app
-
trocadorfyhlu27aefre5u7zri66gudtzdyelymftvr4yjwcxhfaqsid.onion
Fake websites:
-
troccador, troccadoor, trocadoor (any other typo)
-
trocadupz35kdyzgqpadqor4jk7u4lmbo2(…).onion
Right now our services are suffering non-stop DDoS attacks for the last three weeks, and they are using ToR exit nodes to conduct such attack (both through clear net and onion). For this reason we had to turn off our Onion link, as we are working into pushing changes to mitigate the attack. There’s a chance that these fake websites might be related to the attack, they might be trying to lure users into their fake clones, so it is important to Bookmark the correct website. Stay safe! Our team is small, but we are working into going back to normal.–
thank you so much for staying publicly communicative
it’s weird that they are able to ddos an onion. i thought tor had pow mitigations? but this is good learning for TOR to better mitigate ddos i guess
i honestly think this is a fed or similar attack. trocador is a great service and they want people to not have anonymity or freedom.
stay strong team.
it’s weird that they are able to ddos an onion. i thought tor had pow mitigations?
I want to know about this too. Why didn’t you use HiddenServicePoWDefensesEnabled?
We have not yet implemented PoW, as our team is small and we are trying to mitigate the attack on clearnet first, since most users come from there. But yes, some nice people already suggested this, and we’ll look into it this week.
This doesn’t add up:
nobody else noticed the inconsistencies?! They are running a business, they need to comply. And now playing stupid! Getting free ads with FUD. This doesn’t add up, indeed.
Edit: It does make a great deal of sense, however, if you think the big bros (not troc) are trying to sell “Cybersecurity”. Before they start selling, they create the need first. It works the same way every time: they sell you wars, peace, vaccines, security, privacy, co2 certs or even your own slavery. What to us looks like false flags — to them its all good business practice.
We are just updating the community to let people know that services are disrupted right now, not working 100%. We need to be open about this otherwise users will complain asking why we did this or that, so we are just being transparent. We also need to let users know there are fake websites running because we have already seen some users lose money to these scams, so this is quite important. About what you also said, yes, many other onion websites are suffering attacks as well. I believe eXch was suffering DDoS too, among others.
I respect that. But I am also around long enough: Flooding attacks never lasted long in the past and did not cause permanent disruption. Iet’s not call it hacking, its plain old overloading. After 3-5 days its over usually and admins learnt a lot in that time. (Run a stressnet node!)
And BTW trocador.app is loading as fast as ever here. All the best, your customers just need patience.
Thanks! Yes, we are improving our firewall rules and this week we expect everything to be running smooth again.
Also look into PoW captchas as well, in case it helps :)
Someone said we should run a separate server to work as a load balancer and generate these captchas as they might consume processing from the server. We’ll look into it. Thanks!
suffering non-stop DDoS attacks for the last three weeks, and they are using ToR exit nodes to conduct such attack
This doesn’t add up:
- Exit nodes are not involved in onion site visits. Exit nodes are only involved in connections from Tor to the clearnet.
- The tor network itself does not have a particularly massive amount of exit node bandwidth, and anybody trying to use a large fraction of that will attract the attention of the tor developers. I have a very hard time believing that the bits per second you can push through tor exits result in a bandwidth bill that a popular exchange (like yours!) has any difficulty affording.
Blink twice if you’ve been threatened by a three-letter agency.
Good luck,
Regarding 1, the attack has been going on for weeks, and now the attacker shifted to using mostly ToR exit nodes on the clearnet, so some users reported that it is not always that they can access the website when using exit nodes, sometimes they get blocked because of the rate limiting that is in place to fight off the DDoS. But we can see the attack on localhost as well (actually spamming on localhost), which indicates the attacker is also using onion connections to attack us. This is a fact. Some people from the community suggested we implemented some solutions on onion, and we are going to look into it this week.
Regarding 2, that’s exactly what is happening, as other services are also being affected see https://status.torproject.org/; As we said, we are a small team and we are working into solving all issues this week. We’ve been providing the community with good services for quite a while, and we hope to normalize the situation once we improve our defenses.
Network Performance Issues v3 Onion Services “We’ve been experiencing an unusually high load on the Tor network during the last couple of weeks, which impacts the performance of onion services and non-onion services traffic. We are currently investigating potential mitigations.”
nobody using endgame anymore?