[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-dev] Paper on how DNS affects Tor's anonymity
My colleagues and I published a (not yet peer-reviewed) research paper
on how DNS affects Tor's anonymity. The key parts of our work are:
- We measure the DNS setup of exit relays over time, showing that at
times Google got to see almost 40% of DNS requests coming out of Tor.
- We show how website fingerprinting attacks can be augmented with
observed DNS requests, resulting in precise attacks for unpopular
websites.
- Similar to the "Users Get Routed" work, we simulate the impact of our
attack at Internet-scale using the TorPS simulator.
The PDF is available online:
<https://nymity.ch/tor-dns/tor-dns.pdf>
Our project page has code, data, and replication instructions:
<https://nymity.ch/tor-dns/>
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev