[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: How can I trust all my Tor nodes in path



On Friday 01 December 2006 21:23, Seth David Schoen wrote:
>
> Some people have suggested that this is a good application for
> trusted computing; proxies could prove that they're running the
> real, official proxy software on top of real hardware.  Then timing
> attacks are still possible, but actually logging data directly could
> be prevented.  The problem with this seems to be that intentionally
> doing timing attacks directly against a proxy you operate, from within
> the same network, is probably pretty effective!  

You've lost me here - could you explain further? How would it prevent logging 
data?

> This approach might 
> be more relevant to lower-latency anonymity services such as e-mail
> remailers.

-- 

KlamAV - An Anti-Virus Manager for KDE - http://www.klamav.net
TorK   - A Tor Controller For KDE      - http://tork.sf.net