[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Help me secure my setup



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Aeris <aeris+tor@xxxxxxxxxx>:

>> I don't want to 
>> give out a correlation between time of starting the client and time of my 
>> Tor activities.
> 
> Event with always connected client, you can be correlated  :
>         online : more Tor traffic (consensus + circuit + data)
>         offline : less Tor traffic (consensus only)

You're right...

I have one more question. What are the drawbacks of not preserving Tor 
state directory between reboots? I reboot the router rarely, but it can 
happen from time to time. I run Tor from ramdisk and I don't want it to 
have any persistent storage - I want it to vanish completely as the router 
shuts down.

One drawback that I see is that after every reboot, a new entry guard will 
be selected and it can make correlation attacks easier. Maybe it would be 
wise to copy old state file during each "Tor deployment" process (by which 
I mean creating the ramdisk and copying Tor over the network to it from a 
secure machine)?

- -- 
Oskar Wendel, o.wendel@xxxxxxxxxxxxxxxxx
Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C
Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C
-----BEGIN PGP SIGNATURE-----

iQEcBAEBAgAGBQJWk+ykAAoJEGaQzFIxjbhMExkH/2KT+L+ok21+G67IewMr4A7q
WNAwaaHKIzQePGEUImTxTNUBgUwtk45MlD0PmTgBLNcwT7FOuhJUCnl7s40Bdpk4
NfHvZYEY9xvZgm6ZQD7q62h9XN2fTSHNjR5s9Uc/EITQ7Gw+c+1UREedOgfHoSJX
GJhFNkt2yo/Ui8P4wQkOyvSrSaZHrIRONwMgUa9RAoemw8DNtyRn+mAxga/tvLzL
7Bvz/t9rrnAmv6TSot8Vw0KYt89PHeqoWcLIA1AZoc99cr5RK5GDt8oIhUFTp0BH
WlX23e6gQAAfkJcF5FVU3y5Pn+U92Gr+nPDZjDc0KbadUFKlNi59gE9ChP7//9s=
=2cYl
-----END PGP SIGNATURE-----

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk