[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] I have a quick question about security of tor with 3 nodes



On Fri, 29 Aug 2014 18:59:19 -0600
Mirimir <mirimir@xxxxxxxxxx> wrote:

> On 08/29/2014 01:55 AM, John Doe wrote:
> > Surely this is not as simple as that which you said. Why have even a
> > middle node if it is only the first and last nodes that count? I
> > cannot believe this is a simple thing of the first and last nodes
> > giving people up.
> 
> Some do use just entry guard and exit relay, for lower latency.
> 
> Even the NSA, with global intercepts, is apparently not doing
> full-network traffic correlation among Tor relays.

	And you know that how, exactly?



> Maybe they will
> after Bluffdale is fully functional.
> 

	Or maybe not...? Because, maybe, the idea hasn't crossed their
	minds? Or? 




> But Sybil attacks are clearly feasible, and require just some cloud
> servers and the skills to use them. See Johnson et al. (2013).[0] It
> seems that Sybil attacks against Tor are limited in scale not so much
> by an adversary's resources, but rather through oversight by Tor
> Project staff. Even though Tor is an open network, relays that behave
> suspiciously get evicted.
> 
> [0] Johnson et al. (2013) Users Get Routed: Traffic Correlation on Tor
> by Realistic Adversaries.
> http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk