[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] de-anonymization by correlating circuit changes



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


>> You mentioned having traffic logs from all possible servers.
>> If by "servers" you mean 'honestly and properly run Tor relays',
>> then those logs do not exist, so what you are saying is not
>> possible.
>
> Well, yes, i meant exactly this scenario. Unfortunately, this is
> possible today. Some countries in europe have indroduced data
> renetion laws, like denmark. They log, for example, everz 100 or
> 500 IP Packet passing a providers network.
>
> So, of course, you wont have a log with all packets, but i think,
> one, which enough information, to correlate the time of incoming
> packets (to the exit relay) and outgoing packets (to a website
> e.g.).
Would this apply if you are running a Tor relay? i.e. impossible to
correlate the time of the incoming packet??

Perhaps the solution is to make it as easy as possible for anyone to
be a low bandwidth tor relay (with speeds of say 32-64 kb/s), which
would increase the size of the network and also the person's
anonymity? I'm thinking as close to possible as 2 clicks and voila...
as it is, it's still a relatively complicated endeavour!


- -- 

GPG Key: CF345FAE
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iF4EAREIAAYFAk5RaokACgkQa+8M6M80X65sFQEAiqDHbIItMFxa0/Awd5Y14jMS
tW8WRUF9hP/M2lpcZzoBAPHP49Vz7Yl/o9OEDqU/5y3u9UPHRchx+iX5VlYyXs77
=PrqW
-----END PGP SIGNATURE-----

_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk