[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16861 [Tor]: Pad Tor connections to collapse netflow records



#16861: Pad Tor connections to collapse netflow records
-----------------------------+--------------------------
     Reporter:  mikeperry    |      Owner:  mikeperry
         Type:  enhancement  |     Status:  needs_review
     Priority:  normal       |  Milestone:
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+--------------------------

Comment (by yawning):

 Note: Still trying to boot my brain up.

 Replying to [comment:6 arma]:
 > I've been envisioning even like a grand challenge: "Hey everybody, here
 are five attacks, they sure seem hard to resolve, especially all at once,
 but let's think about ways to increase the false positives at scale." For
 some of them even a small bump in false positive rate would be huge in
 practice. It would be neat to get two different designs and then have
 people analyze the heck out of them. Ideally even more than two.

 Another question we should pose to the research community is "we know this
 netflow thing is done, we know that a certain amount of metrics tracking
 is required as part of the administering a large scale network, is there a
 way to get an acceptable amount of information in a privacy preserving
 manner?".

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs