Been reading a bit about what TOR is going through regarding attacks and site seizures by the EU and US Feds.
One comment on the thread states a possible vulnerability to BTCD and superNet IMO: "My speculation about what happened follows. The attacker floods a particular hidden service with random/innocent GET requests at a chosen time. The network links are monitored for that flood pattern. Then the suspected servers are unplugged briefly, and the attacker checks which HS goes down at the exact same time. Now the search for evidence actual begins. It is a very simple and effective attack, particularly against low-traffic servers."
TOR discusses some points of attack in the following thread. Worth a read for thinking about if any of the proposed issues may affect the BTCD network:
https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous/Would be interested to hear more about this. However, the simplest explanation is often the best. It looks like some of the guys who got busted weren't exactly careful (email address hidden in site code, for example). Following the bitcoin paper trail probably got plenty of info too. Then the cops over-stated their success and the media picked it up...
I suspect there's nothing too profound going on here.
how is " the suspected servers are unplugged briefly" done?
if the attacker is controlling the physical internet, then we can assume they can simply send in their staff to where you are and directly monitor what you are doing.
Since all comms are based on direct peer to peer comms, the truly paranoid just has to create onetime use private addresses. That side steps even this level of attack, as there isnt this constant activity that goes away
Telepathy/Teleport out of the box will provide corporate level privacy, as opposed to personal level. To get to total privacy, it will take additional layers of work
James