
18 Feb
2015
18 Feb
'15
2:17 p.m.
On Feb 16, 2015, at 5:43 AM, Florian RĂ¼chel <florian.ruechel.tor@inexplicity.de> wrote:
It would also help me a lot if you can direct me to papers or articles that have shown specific attacks that are known to work on the current network.
You might want to look into the Sniper Attack as an example of how to evaluate attacks on Tor safely using Shadow: http://www.robgjansen.com/publications/sniper-ndss2014.pdf For those wanting to follow the Shadow thread on this topic, that starts here: http://mailman.cs.umn.edu/archives/shadow-support/2015-February/000312.html Best regards, Rob