[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] about tor entry node
esolve esolve:
> what I meant is:
>
> Let me say that an attacker controls some nodes. At a certain time, one of
> the controlled nodes is used as entry node by a tor client, if the
> attacker doesn't know that the node is used as entry node, then the
> attacker can't identify the client. Even if it examines the IP addresses of
> the lists of relays, the suspicious IP may belong to a client or a bridge.
I might be misinterpreting what you say.
I don't know what a client does, that a relay does not do, because I
don't know the protocol well enough. (How does a relay extend the circuit?)
For example clients and bridges can be told apart, because sometimes
bridges do things different than clients. (This is going to be resolved
where ever possible).
> so why tor designer let the attacker know when a controlled node is used as
> entry node?
>
You probably have to wait for an answer...
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk