[Release] Thronion & Ophanion – DDoS Protection Frameworks for Tor Hidden Services (Rust)

[Release] Thronion & Ophanion – DDoS Protection Frameworks for Tor Hidden Services (Rust)

Hi all,

I’ve open-sourced two Rust-based DDoS protection systems specifically designed for Tor hidden services:

  1. Ophanion – Resonant-Monolith DDoS Protection

    • Focus: baseline, defensive DDoS shielding for .onion services
    • Uses a “Resonant Invariant Kernel” and a monolithic filter to absorb and re-route attack traffic
    • Aims to keep legitimate circuits alive under heavy load with minimal infrastructure
    • License: MIT

    Repo: GitHub - LashSesh/ophanion: OPHANION is a DDoS defense system designed for Tor Hidden Services.

  2. Thronion – Quantum-Enhanced DDoS Protection

    • Next-generation evolution of Ophanion
    • Introduces a “Quantum-Resonant Invariant Kernel” with layered filtering and adaptive behavior
    • Designed as production-ready: structured modules, tests, clear architecture, better observability
    • License: Apache-2.0

    Repo: GitHub - LashSesh/thronion: Thronion is a next-generation DDoS protection system for Tor Hidden Services, combining proven operational capabilities with cutting-edge quantum-inspired algorithms.

Both projects are strictly defensive: their only purpose is to protect Tor hidden services from volumetric / protocol-level abuse, not to perform attacks. They are meant for operators who struggle with DDoS on onion services but don’t have centralized mitigation infrastructure.

I’d be very interested in:

  • Feedback on the overall architecture and threat model
  • Reports from operators who experiment with these systems in the wild
  • Suggestions for additional defenses / integrations in the Tor ecosystem
  • Potential pitfalls you see for deployment in high-risk environments

Thanks for any feedback, critique or questions.

1 Like