Skip to content

Oniongroove Threat Model

Threat Model

Initial considerations:

If backend keys are disposable, then the operators could consider whether only the frontend instance(s) should be in an evironment of maximum control (such as a hardened/secured baremetal on their datacenter). Backend keys could then be periodically rotated (as a mitigation for the current lack of implementation for offline .onion keys) ou replaced in case of detected compromise, reducing eventual damages to shorter periods (if Onionbalance support such rotations).