[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Re: Self hosting bridge at home - de-anonymization risk?



Thank you mpan, I agree, is the problem that I am using:
1. the same entry node for every circuit?
2. entry node can be traced to me directly, because it's hosted in my geographic
location (at home)?

I agree that blending your traffic with other users is security by obscurity and
it's not worth the cost of weakening tor network model
but what if you used tor normally, not through your own bridge, but through
"regular" randomly chosen 3-hop circuits and at the same time run a tor relay
(entry/middle) that regularly hosts tor traffic of other users
is it incorrect to assume that this would add some level obscurity that would
benefit your anonymity? This wouldn't require weakening the tor circuit model
anymore

_______________________________________________
tor-relays mailing list -- tor-relays@xxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to tor-relays-leave@xxxxxxxxxxxxxxxxxxxx