Il 14/02/2008 13:36, Anon Mus ha scritto:
A. Attacker obtains genuine private keys by, 1. Attacker sets up a number of genuine tor servers 2. Attacker infects genuine tor nodes with spyware
Setting up rogue (or compromised) nodes won't work for getting the directory authority private keys. That makes the rest of your assumption empty. As Roger pointed out:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#KeyManagement Jan