[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Method of detecting intermediary communication device. US Patent 7,466,654
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Method of detecting intermediary communication device. US Patent 7,466,654
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Fri, 26 Dec 2008 13:43:51 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Fri, 26 Dec 2008 16:44:09 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=NIHmfC3R4e7EWFKBTevOP4AVNTv9+TL3setw+04QGTQ=; b=HuYQUm6zl+QaFHjnbuZ/n7KSoWTw50lYX7ZlwCKjAvXdZVIlNl7O5OOSTcJzDePyiU 2AWg3diGfYj+htw8WqWHd9GXbVDnTOC+QyzMUniRwZYn6/uf70jxv+ypeOJoYu2zTtEl JUDkoS0odtGDSuwQprFeypDJGcFBZdeh7mSfo=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=cLnBKYrGFrPSWnOfXfNMrXIkk3EhwC3d0d9ntp+A7GdJ8x64gshIMBkRdtb/LCm0Cb l1JK8NYNudaS3rfYUY1k+9TvpM27H+pTXXn38ANLE0ffujto5L8z74C0T6bZmgqAeJjk qKQAl5o/aTaWz9pRIl27wlW3NJEPmzZjrupJM=
- In-reply-to: <460837.71488.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- References: <460837.71488.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mozilla-Thunderbird 2.0.0.17 (X11/20081018)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
If I'm reading that abstract right, yes; however, it's a moot point. Tor
- - historically* - doesn't try to hide from either a local observer
(let's call her "Eve") or a destination server (let's call its admin
"Bob") that a user (let's call her Alice) is using Tor (i.e., an
"intermediary communication device").
It simply prevents:
- --Eve from knowing that Alice is talking to Bob;
- --Bob from knowing that Alice is the one talking to him.
Eve can easily figure out that Alice is using Tor (but not who she's
talking to). Bob could look up the IP of the exit node Alice is using to
connecto to his server, and realize that a Tor user is contacting him,
but not that it's Alice.
*: Although I'm not well-versed on it, the new "bridges" model -
intended primarily for citizens of oppressive regimes - is supposed to
help prevent Eve from knowing Alice is using Tor; it does not, however,
prevent Bob from knowing a Tor user is connecting to his server.
- --
F. Fox
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=URLD
-----END PGP SIGNATURE-----