[tor-talk] Timing attacks and fingerprinting users based of timestamps

Flipchan flipchan at riseup.net
Sun Nov 6 21:19:50 UTC 2016


So i was thinking about timing attacks and simular attacks where time is a Big factor when deanonymizing users . 
and created a Little script that will generate a ipv4 address and send a get request to that address https://github.com/flipchan/Nohidy/blob/master/traffic_gen.py then delay x amount of seconds and do it again. This will probelly make it harder for the attacker to fingerprint the users output data due to the increased data flow coming out from the server. 

So to protect against traffic timing attacks and simular would be to generate More data.

Has anyone else got any other solution for these kinds of attacks?

Take care
-- 
Sincerly flipchan 


More information about the tor-talk mailing list