Is it desirable to prevent users from choosing their own circuits?

Martin Fick mogulguy at yahoo.com
Fri Oct 2 17:18:03 UTC 2009


--- On Fri, 10/2/09, Brian Mearns <bmearns at ieee.org> wrote:
> Interestingly, "Applied Cryptography" (by Bruce Schneier)
> briefly discusses a distributed timestamping protocol that uses a
> hash of the content to be stamped in order to select which nodes will
> provide the stamp, the idea being that the requester can't simply
> choose to use nodes he controls in order to forge the timestamp. 

This would likely only work if the person attempting 
to timestamp something does not control what he is 
attempting to timestamp in the first place.  In other 
words, if the attacker cannot choose his input, he 
cannot force an output.

-Martin


      
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list