OSI 1-3 attack on Tor? in it.wikipedia

Jan Reister Jan.Reister at unimi.it
Thu Feb 14 13:23:08 UTC 2008


Il 14/02/2008 13:36, Anon Mus ha scritto:
> A. Attacker obtains genuine private keys by,
> 1. Attacker sets up  a number of genuine tor servers
> 2. Attacker infects genuine tor nodes with  spyware

Setting up rogue (or compromised) nodes won't work for getting the 
directory authority private keys. That makes the rest of your assumption 
empty. As Roger pointed out:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#KeyManagement

Jan



More information about the tor-talk mailing list