a serious TOR adversary?

dante dante at virtualblueness.net
Wed May 21 12:24:06 UTC 2008


Bernardo Bacic wrote:
> This link http://web.crypto.cs.sunysb.edu/spday/ contains a summary
> description of a possible TOR threat.
>
> Does anyone have more details? opinions?
>
>
> (apologies if this has been discussed before, i read the list only as
> much as time permits)

This appears to be a variation on the work by Bauer et al. at U.
Colorado at Boulder in which they exploit the tension between anonymity and
low latency.  Basically, an adversary that is able to watch traffic on a
certain percentage of entrance and exit nodes can correlated connections
in and out of the tor-cloud (based on the timing) and deduce the source,
thus compromising anonymity.  It reminds us that " This is experimental
software. Do not rely on it for strong anonymity."

See
http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf






More information about the tor-talk mailing list