[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Comments?



On Mon, Aug 07, 2017 at 09:32:20AM +0200, Jon Tullett wrote:
> On 4 August 2017 at 02:05, Paul Syverson <paul.syverson@xxxxxxxxxxxx> wrote:
> > On Thu, Aug 03, 2017 at 04:38:49PM -0700, Jacki M wrote:
> >> Comments on Paul Syverson Proposed attack?
> >> Paul Syverson - Oft Target: Tor adversary models that don't miss the mark
> >> https://www.youtube.com/watch?v=dGXncihWzfw
> >>
> > More seriously. The point of this work is not to propose attacks per se
> > but to observe that a Tor adversary intending to target individuals or
> > specific groups might be much more effective against those targets
> 
> Enjoyed the video - thanks Paul. It cut off before Q&A...were there
> any particularly good questions from the audience?

Ermm probably? I just don't recall completely now weeks later, though
I remember we did fill up the remaining time. Let's see, I had an
exchange with ermm maybe Prateek Mittal, where in response to his
question I emphasized that we weren't suggesting ignoring the
prospects of a hoovering adversary. In fact hoovering might be the
source of some of the inputs an adversary might use to decide to
target an individual, group, or destination. But, it would then be
more likely for the reasons I presented, for an adversary to follow a
targeting strategy even if it had hoovering capabilities already set
up.

Another point that was raised to me in a side comment after the Q&A
was that what I said about evidence for onionsite fingerprinting from
the Oakland poster by Juarez et al.could have been interpreted
differently than I intended.  They showed in that work that
identifying a circuit as an onionsite connection (vs. not an onionsite
connection) via fingerprinting from the middle relay on the client
side was 99.98% effective. They didn't address fingerprinting specific
sites therein. I stand by our claim that given the smallness of the
space and other factors that such fingerprinting is likely for current
Tor and onionspace to be very effective. (Once we make all my
grand-vision changes to onionspace that I'll talk about in my ESORICS
keynote paper, that could well change. But that's c. 5-10 years away
at this point.) Which leads us to...

> 
> Curious to know - at a practical level, have you actually tried any of
> it in practice, or had any contact with anyone who has? I mean, do the
> results in practice mirror the predictions in terms of distribution
> and probability ito deanonymising potential targets?

No we haven't yet tried this in practice. As usual, it is hard to set
up an experiment like that in a way that adequately protects user
safety and privacy. There is work in progress that has gone through
review by the Tor Research Safety Board and will use PrivCount to
gather information about the amount of activity on a particular known
and public onionsite.  But it's still very much in the works.

HTH,
Paul
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk