[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #18191 [Tor]: .onion name collision



#18191: .onion name collision
-------------------------+---------------------------
 Reporter:  cypherpunks  |          Owner:
     Type:  defect       |         Status:  closed
 Priority:  Immediate    |      Milestone:
Component:  Tor          |        Version:
 Severity:  Blocker      |     Resolution:  duplicate
 Keywords:               |  Actual Points:
Parent ID:               |         Points:
  Sponsor:               |
-------------------------+---------------------------
Changes (by cypherpunks):

 * priority:  Medium => Immediate
 * severity:  Normal => Blocker


Comment:

 > Until then, collisions are possible, but unlikely.
 LOL. If anyone can generate human-readable .onion address with desired
 beginning/ending on an ordinary PC, then NSA can generate a key
 corresponding to any existing .onion address (which is 32*32 much effort).
 It is not unlikely, if the NSA wants to make MiTM on specific .onion sites
 (I'm sure they want), because they can afford ASICs for this and I'm sure
 they already have an FPGA-based bruteforcer (it can be no harder than a
 masterthesis).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18191#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs