[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: hostile node anonymity attack scenario
On Mon, 31 Jan 2005, Paul Forgey wrote:
> But that requires I trust the first node. Since the crypto starts
> between the attacker and my node, the attacker can decrypt my data,
> assuming that it can fool me into thinking it did extend operations.
The crypto starts on your computer. The tor instance you are running.
node 0 of your chain if you like to call it that.
> So now my question is now this. How can nodes, at any hop, not fool me
> into thinking they did extend operations when they really did not? Does
> does my node have public key knowledge of ALL possible nodes it can
> route through?
Your onion router has knowledge of all nodes, yes.
--
PGP signed and encrypted | .''`. ** Debian GNU/Linux **
messages preferred. | : :' : The universal
| `. `' Operating System
http://www.palfrader.org/ | `- http://www.debian.org/