Relakks

coderman coderman at gmail.com
Thu Nov 30 21:24:39 UTC 2006


On 11/30/06, Tony <Tony at tdrmail.co.uk> wrote:
> I think you are mistaken. Going via an encrypted pipe to a foreign proxy
> certainly does not make it easier.

sure, privacy via an encrypted link is better than plaintext.  but
that's different from anonymity, which is what i was referring to.


> Sure with analysis and a fair bit of processing power they could
> eventually match your output from Relakks to your source IP by a timing
> attack.

straight forward correlation via traffic analysis to determine source
and destination is easier than "eventually" in such a situation.


> Assuming they can monitor a Swedish ISP at source. However, I
> doubt that they have that capability - certainly the Swedish government
> is very unlikely to give it to them. Anyway, the next time that you
> connect and get a new IP then they have to work from scratch again.

it's easier than you assert.  monitoring the swedish ISP is not
necessary, and changing IP's doesn't gain you much, if anything.


> It certainly makes it more difficult and probably out of reach of for
> instance the RIAA, MPAA and other such rights restriction organisations
> to go after file sharers, DRM hackers and the like.

more difficult != anonymous.


> Possibly if you are a terrorist and the NSA is able to bring all its
> resources to bear then it is not enough, but it is probably good enough
> for the vast majority that want privacy.

Tor does not defend against a global eavesdropper like the NSA.

this is not to say Relakks is worthless, but it does not offer strong
anonymity like Tor provides.

best regards,



More information about the tor-talk mailing list