[Release] Thronion & Ophanion – DDoS Protection Frameworks for Tor Hidden Services (Rust)
Hi all,
I’ve open-sourced two Rust-based DDoS protection systems specifically designed for Tor hidden services:
-
Ophanion – Resonant-Monolith DDoS Protection
- Focus: baseline, defensive DDoS shielding for .onion services
- Uses a “Resonant Invariant Kernel” and a monolithic filter to absorb and re-route attack traffic
- Aims to keep legitimate circuits alive under heavy load with minimal infrastructure
- License: MIT
Repo: GitHub - LashSesh/ophanion: OPHANION is a DDoS defense system designed for Tor Hidden Services.
-
Thronion – Quantum-Enhanced DDoS Protection
- Next-generation evolution of Ophanion
- Introduces a “Quantum-Resonant Invariant Kernel” with layered filtering and adaptive behavior
- Designed as production-ready: structured modules, tests, clear architecture, better observability
- License: Apache-2.0
Both projects are strictly defensive: their only purpose is to protect Tor hidden services from volumetric / protocol-level abuse, not to perform attacks. They are meant for operators who struggle with DDoS on onion services but don’t have centralized mitigation infrastructure.
I’d be very interested in:
- Feedback on the overall architecture and threat model
- Reports from operators who experiment with these systems in the wild
- Suggestions for additional defenses / integrations in the Tor ecosystem
- Potential pitfalls you see for deployment in high-risk environments
Thanks for any feedback, critique or questions.