[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] End-to-end correlation for fun and profit



On Tue, Aug 21, 2012 at 10:33 PM, The Doctor <drwho@xxxxxxxxxxxx> wrote:
> That suggests that an attacker won't get nearly as much information with this attack as it seems.

No, you didn't understand the point of the attack.

> A valid point, I will concede.

Nothing written about /16 and /24 networks in this thread is relevant
to the (obvious) attack. I don't understand the purpose of most
replies here. How can it be described any simpler? You intercept
traffic at 25 nodes, you can deanonymize 25% of the traffic, or watch
80% of exit traffic. This makes one wonder whether this mailing list
is suitable for any discussion that assumes even the most basic
background.

> Exactly how strongly weighted by bandwidth is node selection these days?

It is linear, unless I missed something in the code. If it wouldn't be
linear, then nodes would be under- or over-utilized.

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk