[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Possible attack method?? Question..
Well, kind of. Imagine if a person constantly download a ton of data (say a large iso for several hours). That person would be seen as "the person". So you have to differentiate yourself from other traffic to conclusively prove it was you. Now, a much more effective means is to go "these 10 people connected between 1 and 3 pm as we know our suspect did. In that case, we can do background checks on them and rule out certain individuals". If you're leaking internal CIA documents or fighting any adversary of that skill, I don't think tor is strong enough and you should never ever ever challenge a government agency of that type of strength regardless of the legality of your activity from your home connection.
Comrade Ringo Kamens
On Jan 11, 2008 5:02 PM, Jon McLachlan <mcla0181@xxxxxxx
(please correct me if I'm incorrect but...)
if the adversary controls your entry-guard (which is nearly impossible
to detect and considered a 'strong' adversary)
if the adversary controls input to your tunnel (like text in an email,
which is easy)
and, if you do not use end to end encryption,
Then, the adversary can perform traffic analysis on the exit node, and
the adversary can easily discover your true ip.