[tor-dev] Special-use-TLD support

Tim Wilson-Brown - teor teor2345 at gmail.com
Tue Sep 29 07:42:54 UTC 2015

> On 29 Sep 2015, at 09:39, Jeff Burdges <burdges at gnunet.org> wrote:
>> The issue I do see is that SPV validation doesn't work well unless
>> you
>> ask multiple peers to make sure that you're getting the chain with
>> the
>> most PoW.  So I gather that this would require connecting to Namecoin
>> peers running on multiple exit nodes.  I don't think that's
>> problematic, but it would have to be taken into account.
> This is no different from validation for existing DNS results.  Tor
> attempts to prevent this by building a list of bad exits, but it's
> challenging to catch an exit that attacks only one website.
> You could check multiple peers but that costs you some anonymity.  If
> you use many .bit names, this might expose the fact that you use
> Namecoin to your guard.

How do you anticipate this exposure happening? Via traffic correlation?

As far as I understand, your guard only sees your encrypted traffic, and not your exit(s) or your DNS queries.


Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP 968F094B

teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150929/1fb91adb/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 873 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150929/1fb91adb/attachment.sig>

More information about the tor-dev mailing list