[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Netflow analysis breaks Tor



After reading the paper it seems the attacker needs to inject html
traffic into an unencrypted TCP connection, so not only it would be
detectable by the client but also wouldn't work on Hidden Service
traffic. Am I missing something?

> Professor Sambuddho Chakravarty, a former researcher at Columbia
> Universityâs Network Security Lab and now researching Network
> Anonymity and Privacy at the Indraprastha Institute of Information
> Technology in Delhi, has co-published a series of papers over the last
> six years outlining the attack vector, and claims a 100% âdecloakingâ
> success rate under laboratory conditions, and 81.4% in the actual
> wilds of the Tor network.
> 
> http://thestack.com/chakravarty-tor-traffic-analysis-141114
> https://mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf
> 
> Future defense work: dummy traffic padding
> 
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk