[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] tor-talk Digest, Vol 43, Issue 67



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

As long as the current guard model is in place then the relay could
probably tell if its a client vs bridge by the frequency of visit. I'm
assuming that a client visits one of its guard more often on average
then a random bridge would connect to that guard. There is probably
something in the code that tells the node which spot they are in.

The network would be slightly less secure because the chances of
having the first and last node would be improved, making correlation
attacks easier. It would how ever not be a third easier though,
because of Guards and exits wouldn't be used (much) as a middle node.

On 08/31/2014 05:00 AM, tor-talk-request@xxxxxxxxxxxxxxxxxxxx wrote:

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=EoeN
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk