[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17031 [general]: hardware tor relay



#17031: hardware tor relay
-------------------------+-----------------
     Reporter:  elypter  |      Owner:
         Type:  task     |     Status:  new
     Priority:  normal   |  Milestone:
    Component:  general  |    Version:
   Resolution:           |   Keywords:
Actual Points:           |  Parent ID:
       Points:           |
-------------------------+-----------------

Comment (by kernelcorn):

 What you are describing is called a Sybil attack and introduces encrypted
 hardware is not a defense for this attack. There's nothing to stop an
 attacker from buying many legitimate copies of your encrypted hardware and
 still taking over the network that way. Also, it's completely impractical
 to distribute encrypted hardware to all relay operators and potential
 operators.

 Even if the hardware prevented an attacker from manipulating Tor traffic
 at an application level, they could still run your encrypted hardware and
 wiretap Tor traffic flowing in and out of the device. If they gained
 enough traffic, they could still carry out many types of passive and
 active attacks upstream of your devices, which would be damaging to the
 Tor network.

 The main defense that Tor uses against Sybil attacks is consensus weight,
 which makes it more difficult and costly for an attacker to actively gain
 access to significant amounts of Tor traffic.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17031#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs