[tor-talk] about tor entry node

Julian Yon julian at yon.org.uk
Sat Dec 8 04:32:36 UTC 2012


On Fri, 07 Dec 2012 23:23:17 +0100
"Sebastian G. <bastik.tor>" <bastik.tor at googlemail.com> wrote:

> Low latency networks such as Tor suffer from traffic correlation,
> which has not been defeated yet. As far as I know this would be very
> hard to accomplish, if at all.. (I'm not experienced enough with this
> topic.)

There is a relatively simple strategy for mitigating correlation
attacks: decoy traffic. The problem is, the lower the latency, the more
decoy traffic you need to effectively cover the trail. And to avoid the
decoys being readily identified, a proportion of them must propagate
through the network by at least two hops. This is plausible for high
latency networks such as remailers but completely impractical for Tor,
unless available bandwidth ever significantly exceeds demand.


Julian

-- 
3072D/F3A66B3A Julian Yon (2012 General Use) <pgp.2012 at jry.me>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 230 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20121208/b0f9abc3/attachment.pgp>


More information about the tor-talk mailing list