Reduce hops when privacy level allows to save Tor network bandwidth

Brian Mearns bmearns at ieee.org
Tue Nov 17 16:15:10 UTC 2009


On Tue, Nov 17, 2009 at 8:57 AM, Erilenz <erilenz at gmail.com> wrote:
> The following occured to me. Tor is designed to protect users from
> traffic analysis by very technical adversaries. There are many use
> cases where that level of protection isn't required. In those cases,
> if there was a config option to reduce the number of hops in a circuit
> to 2 (or possibly even 1), then users would be able to get themselves a
> more responsive circuit, whilst saving the Tor network overall
> bandwidth.
>
> In a three hop circuit, when x contacts y, the Tor network ends up
> having to transfer 4X the data:
>
> x -(1)> Entry -(2)> Middle -(3)> Exit -(4)> y
>
> In a 2 hop circuit it only has to transfer 75% of that:
>
> x -(1)> Entry -(2)> Exit -(3)> y
>
> --
> Erilenz
[snip]


Isn't an underloaded network a security concern anyway, since it makes
it theoretically easier to track if there's not as much going on in
the network?

-Brian

-- 
Feel free to contact me using PGP Encryption:
Key Id: 0x3AA70848
Available from: http://keys.gnupg.net
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list