[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Is three hops enough? (was Re: Tor client over a SOCKS proxy, and Tor client running through another Tor Circuit)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
 
On Fri, Apr 28, 2006 at 11:47:07AM -0400, Anthony DiPierro wrote:
>> If there is an attack that can be made, for example, over a 9 hop
>>  chain where an attacker only has two nodes compromised, I'm not
>> sure what it is.  I suppose there could be some sort of timing
>> attack, one that can't be easily mitigated by cover traffic.
>> Maybe that's what I'm missing.
what you are missing is that more hops results in a hell of a lot of
cover traffic, but does nothing about compromised nodes. killing
responsiveness with so many hops defeats the point of tor tho, since
its main purpose is for low and medium latency applications.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
iD8DBQFEUj6h+KihKRqTxu4RAysgAJ9Q+H3xiS5IfIOnLRtq0NudsMBefgCgoYbx
KhGy8xwV89OwOnkW35Utom8=
=2+vr
-----END PGP SIGNATURE-----