[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor-BlackBelt Privacy
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Tor-BlackBelt Privacy
- From: Roc Admin <onionroutor@xxxxxxxxx>
- Date: Wed, 29 Dec 2010 08:32:57 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 29 Dec 2010 08:33:04 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=aNk55XQJwck+/DqqTb87B7fDL9pnuCwDaihHwqzz1wU=; b=OBhh1p0xHwcCS0wHZU5mPRaE+pgQzHmkW2OfLWbKGDYoq99i4OvQo9BA5fH6mLdIvi RrvITNI6xkw4ZHBEBwEQOgM/iL/2E4DAriUspBQZ+Vk93oyVxI834A3S8zJud/AjRU34 4SrMZJ7ifbYBewB52oZeIjRzOJdEuKjjGGX/E=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=I0yN/6s730zhSbUeC+t5Yfyfo6BYT6e0rn28f9T3PR1BlCane5LSphOi65koTPIoT2 SKJ4RyRL1yDLTuR8J0uRCEHYmU6LhngurgJcEMzQjPeeIrvTyRJyY8rkEwinxCBlxRIy /oYmB7z49DMJjGp5JoA8LcE+zl+nSt7p5jDuo=
- In-reply-to: <4D1B2F3D.2010601@xxxxxxxxxxxxxxxxxxxx>
- References: <4D1B2F3D.2010601@xxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Without any details it's hard to say. I can only guess that it's
using a list of fast exit nodes that its verified. And if that's the
case, it seems basically like the social engineering attack that Nick
Matthewson talked about at Defcon17 where an attacker tricks a user
into using a partition of the Tor network. But this is all
conjecture. Maybe you can dump the torrc so we can see what it's
doing.
--
ROC Admin
On Wed, Dec 29, 2010 at 7:53 AM, Karsten N.
<tor-admin@xxxxxxxxxxxxxxxxxxxx> wrote:
> Hi,
>
> Tor-BlackBelt Privacy wants to seed up Tor with a special configuration:
>
> http://sourceforge.net/projects/blackbeltpriv/
>
> The project says, the original code of tor is used with some
> improvements in configuration to speed up the tor client.
>
> I have done a small test. It seems, high performance nodes are prefered.
>
> The project page offers only a binary download.
>
> What do you think about the project. Is it serious?
>
> Is the preference of high power nodes useful or does it have a bad
> influence on the load balancing of the tor network like the Cloakfish
> idea two years ago?
>
> Thanks for your opinion.
>
> Karsten N.
> ***********************************************************************
> To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
> unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
>
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/