[tor-talk] Current attack of TOR to break anonymity
paul.syverson at nrl.navy.mil
Fri Mar 7 12:39:06 UTC 2014
On Fri, Mar 07, 2014 at 11:29:22AM +0000, Miguel Regala wrote:
> There are some interesting papers on TOR anonymity, not really sure if all
> of them have been addressed.
> The cell based one is pretty fun.
About efficient cell-based attacks (although written long before the
above one was published so not quite addressing all its particulars), see
the Tor blog https://blog.torproject.org/blog/one-cell-enough
> 2014-03-07 10:32 GMT+00:00 Maimun Rizal <maimun.rizal at googlemail.com>:
> > Dear All,
> > is there any attack can be break anonymity in TOR network? if so, how?
> > I assume, if I want to break anonymity in the TOR network, I should take
> > control all of relays which are used by sender and destination as a
> > transmission media.
> > with this assumption, It is easy to show the differences attacker
> > probability in TOR network 2 relays or more relays.
> > some papers explained that TOR network can be broke by attacker take
> > control in entry and exit relays. so what differences if we use more relays
> > on path-link?
> > even there is attacker only need entry relays to break anonymity in TOR
> > network. so the path-link does not affect the level of anonymity.
> > where I can find the source explanation the kind of attacks that related
> > with path-link of the TOR network?
> > or how can we show it, with less relays on path-link will have less
> > anonymity?
> > if no differences, why TOR network use 3 TOR relays instead of 2 TOR relays
> > in path-link?
> > Thank you for advanced,
> > Regards,
> > MR
> > --
> > tor-talk mailing list - tor-talk at lists.torproject.org
> > To unsubscribe or change other settings go to
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
More information about the tor-talk