<div class="gmail_quote">On 14 February 2010 03:15, Scott Bennett <span dir="ltr"><<a href="mailto:bennett@cs.niu.edu">bennett@cs.niu.edu</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class="im">
>But one big problem is that you have no guarantee whatsoever that I'm<br>
>telling you the truth about my measurements. See for example Kevin<br>
>Bauer et al's "Low Resource Routing Attacks Against Tor."<br>
<br>
</div> Yes, I've understood that from the outset, but I haven't seen any<br>
evidence that such abuse is actually happening.</blockquote><div><br></div><div>Tor isn't just designed to be resilient to attacks that are actually being employed. It is designed to be resistant to theoretical attacks too - as well it should be. Indeed: complaining that we're protecting against attacks, but nobody is using them is like saying `I bought this expensive umbrella, but then I didn't even get wet.':</div>
</div>