Hacker strikes through student's router

loki tiwaz loki_tiwaz at hotmail.com
Fri Nov 11 11:00:26 UTC 2005


by adding a protocol to signify persisting connections (so that while a 
circuit operates it is recognised as such) and a single signature check at 
the beginning of the circuit establishment. sure it will add *some* load to 
the server's cpu but the verification only has to be done once every 15 
minutes per user at the most.


>From: Eugen Leitl <eugen at leitl.org>
>Reply-To: or-talk at freehaven.net
>To: or-talk at freehaven.net
>Subject: Re: Hacker strikes through student's router
>Date: Fri, 11 Nov 2005 11:51:41 +0100
>
>On Fri, Nov 11, 2005 at 10:47:24AM +0000, loki tiwaz wrote:
>
> > or how about don't bother with the electronic cash thing, make a 
>protocol
> > which signifies that the packet originated from a tor server and have 
>these
> > packets prioritised. then the p2p folks will be more likely to set up 
>nodes
>
>How do you propose to prove that the packet originated from a bona fide
>Tor server, without agoric load leveling?
>
> > (being that they mostly have bulk bandwidth, they are a good target) 
>will
> > set up more nodes because of the advantage of the bandwidth being more
> > available to them if they run a node.
>
>--
>Eugen* Leitl <a href="http://leitl.org">leitl</a>
>______________________________________________________________
>ICBM: 48.07100, 11.36820            http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


><< signature.asc >>

_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



More information about the tor-talk mailing list