Possible attack method?? Question..

Ringo Kamens 2600denver at gmail.com
Fri Jan 11 21:22:24 UTC 2008


This kind of attack is only effective over vsst amounts of time and can only
conclusively prove who you are if they are able to view all the nodes your
data travelled through.
Comrade Ringo Kamens

On Jan 11, 2008 12:44 PM, Anon Mus <a_green_lantern at yahoo.com> wrote:

> This question is for those with the knowhow.
>
> A while back I got a number of emails from the same source where the
> emails were sent in "pairs" a minute or less apart.
>
> The first of each of the "email pair" were large (over 700characters),
> the second were small (under 50 characters). On the face of it the
> "email pairs"  appeared to be a genuine error ("oh yes I forgot to
> mention" kind of thing) by the sender, so I took no notice at the time.
>
> It was not until this week when re-reading these emails that I realized
>
> the sender had all along been trying to locate me (I was an anonymous
> informant). My guess is that my contact was in fact an intelligence
> (probably British with the help of the USA) plant out there pretending
> to be a (British) activist with a grievance.
>
> My question is, is this "email pair" (of vastly differing sizes) a
> possible attack method on a  Tor user, by somehow watching and counting
>
> (to estimate the size of) a packet stream?
>
>
> -K-
>
>
>
>
>
>  ____________________________________________________________________________________
> Never miss a thing.  Make Yahoo your home page.
> http://www.yahoo.com/r/hs
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080111/31d53849/attachment.htm>


More information about the tor-talk mailing list