[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Article: The Growing Problem of Malicious Relays on the Tor Network



The main issue I see here is the 10%. Thats a really big chunk. They were bigger than me :(  I also mailed the Tor Project after Nusenu did not receive an answer. This has to be much faster in the future.

> On 9. Dec 2019, at 20:26, Dirk <tor-relay.dirk@xxxxxxxxxx> wrote:
> 
> Dear all,
> 
> I was made aware today of the article be nusenu [1]. Please read it.
> 
> So even I theoretically new Sybil attack scenario against the tor
> network - I never was aware it could affect so much of the tor network
> infrastructure:
> "At their peak they reached >10% of the Tor network’s guard capacity".
> 
> The article leaves me with some thoughts:
> 
> + Due to the natrue of the tor network the problem can never be solved
> by 100%
> 
> + How can the tor network be improved to be more resilient against this
> attach (Software & Operation)
> 
> + Is there currently already activity ongoning by the tor project and
> how can we as organizations and operators support it
> 
> 
> best regards
> 
> Dirk
> Tor support team digitale-gesellschaft.ch
> 
> 
> 
> [1]
> https://medium.com/@nusenu/the-growing-problem-of-malicious-relays-on-the-tor-network-2f14198af548
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays