[tor-talk] Matryoshka: Are TOR holes intentional?

l.m ter.one.leeboi at hush.com
Thu Jun 18 11:54:26 UTC 2015


To add to what Roger said,

"Roger Dingledine"  wrote:
> But even full scale padding, ignoring the practical side
> of how to get a Tor network that can afford to waste so 
> much bandwidth, doesn't provide protection in the face of 
> active attacks where you induce a gap on one side and 
> then observe the gap on the other side. And it might even 
> be the case that these gaps happen naturally by 
> themselves, due to network congestion and so on, so 
> maybe passive observers will be winners even against 
> a design that does full padding.

All that padding means nothing if an adversary can introduce latency
or gaps *at arbitrary* locations in a path. An adversary that can see
your guard, and who can also see the guards traffic can introduce the
gaps/latency in traffic at any point in your path. You may not even
see the attack without being able to visualize end-to-end bandwidth
statistics. It might be due to a routing problem at a particular node
in the path. Solving this adversary isn't easy because they can hide
behind the design of the internet. There isn't a single anonymity
network that is immune.

--leeroy



More information about the tor-talk mailing list