"Low-Resource Routing Attacks Against Anonymous Systems"
Ringo Kamens
2600denver at gmail.com
Sun Feb 25 23:31:10 UTC 2007
It's very interesting and from what I can deduce, right. However, this
isn't new news. What *is* new is that it has been proved using math
and logic. I know that tor will eventually rise to defend this attack
as other applications such as freenet (i2p also?) have. Another
implication to consider of this is what if the same ISP controlled the
entry and exit nodes?
Ringo
On 2/25/07, James Muir <jamuir at scs.carleton.ca> wrote:
> No one seems to have posted this to the list yet, so I thought I should:
>
> "Low-Resource Routing Attacks Against Anonymous Systems",
> K. Bauer, D. McCoy, D. Grunwald, T. Kohno, D. Sicker
> Technical Report, University of Colorado
>
> http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf
>
> It was posted on Slashdot:
>
> http://yro.slashdot.org/yro/07/02/25/1913219.shtml
>
> -James
>
>
More information about the tor-talk
mailing list