Cover Traffic

2600denver 2600denver at gmail.com
Sun Apr 16 00:50:57 UTC 2006


Perhaps the server could insert short (randomized) delays between recieving
a request and relaying it.

On 4/15/06, Paul Syverson <syverson at itd.nrl.navy.mil> wrote:
>
> On Sat, Apr 15, 2006 at 07:30:48PM +0200, Nils Vogels wrote:
> > On 4/15/06, 2600denver <2600denver at gmail.com> wrote:
> > >
> > > Does this seem like a plausable solution to stop timing and
> point-to-point
> > > attacks?
> >
> > Yes it most probably does,
>
> Actually, no it doesn't
> http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#YouShouldPad
>
> And such attacks can be real
> http://www.onion-router.net/Publications.html#locating-hidden-servers
>
> >  but it also effectively slows down the
> > entire Tor network bij 66%, at least when you are counting the cover
> > traffic in the bandwidth limits that you set for tor traffic.
> >
>
> Yep.
>
> -Paul
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060415/d8cba553/attachment.htm>


More information about the tor-talk mailing list