Possible attack method?? Question..
2600denver at gmail.com
Fri Jan 11 22:19:06 UTC 2008
Well, kind of. Imagine if a person constantly download a ton of data (say a
large iso for several hours). That person would be seen as "the person". So
you have to differentiate yourself from other traffic to conclusively prove
it was you. Now, a much more effective means is to go "these 10 people
connected between 1 and 3 pm as we know our suspect did. In that case, we
can do background checks on them and rule out certain individuals". If
you're leaking internal CIA documents or fighting any adversary of that
skill, I don't think tor is strong enough and you should never ever ever
challenge a government agency of that type of strength regardless of the
legality of your activity from your home connection.
Comrade Ringo Kamens
On Jan 11, 2008 5:02 PM, Jon McLachlan <mcla0181 at umn.edu> wrote:
> (please correct me if I'm incorrect but...)
> if the adversary controls your entry-guard (which is nearly impossible
> to detect and considered a 'strong' adversary)
> if the adversary controls input to your tunnel (like text in an email,
> which is easy)
> and, if you do not use end to end encryption,
> Then, the adversary can perform traffic analysis on the exit node, and
> the adversary can easily discover your true ip.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the tor-talk