[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Anonymity risks of 2 vs 3 hops
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Anonymity risks of 2 vs 3 hops
- From: Lexi Pimenidis <lexi.pimenidis@xxxxxxxxx>
- Date: Fri, 8 Jan 2010 21:08:30 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Fri, 08 Jan 2010 15:08:40 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:date:from:to:subject :message-id:references:mime-version:content-type:content-disposition :in-reply-to:x-pgp-key:x-additional-data:user-agent; bh=EncKi6V4ZTdZAzq2nc4ZQbQcYOb8HzUsBXwUtRG698w=; b=sP0ZaRhgqShu5nY6AWbXX712pdYe78IfVurHUaEBH8aLcWlA3yx9QAfmlqjDBM+QeM UOsz/sf+AKntrlcWMLmUs/Cpi+vJ6/J/r4F138CXmWUSvZFqgiAgf/zuxqBbqO8R2UOJ sCphjSJKv1yuDIeyO+LsKsr0fiGcyoFFxaM6A=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=date:from:to:subject:message-id:references:mime-version :content-type:content-disposition:in-reply-to:x-pgp-key :x-additional-data:user-agent; b=tegmyin/8ytqNRZLHjLGPK4jm82F2OBFoNSl4XMCiBjoOXqXcRcdsYkyd9BSvfjSkz EJtRPoNdsi6j20kKb3jRCY84YXxDlUH32jb8A7c97hUrW1JjBZ7u1Qk+1OLWfB1i0Rc0 w5MLt7350RX5j5bY/I1sDXE2UBl/puKPy3xH0=
- In-reply-to: <b0d6ed5e1001081156v7f534cb9jcb3117fb10655a65@xxxxxxxxxxxxxx>
- References: <b0d6ed5e1001081156v7f534cb9jcb3117fb10655a65@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mutt/1.5.20 (2009-06-14)
On Fri, Jan 08, 2010 at 08:56:37PM CET, Sam Peterson wrote:
Hej,
> Clearly the experts think it makes things considerably easier here, so
> maybe there's something I'm missing. I appreciate all tutelage.
Just one trivial example is: given that you only have two hop circuits
and an attacker who owns, e.g., four nodes. If your circuit enters the
Tor network he can kill any circuit using any other node than one of
his three as an exit sooner or later, possibly in a way which makes you
believe that it was "just the typical tor way of killing circuits".
This way an attacker can trick you into building a more than
proportional part of crcuits over his nodes. The same attack would not
be possible, or as easily, with an unrelated middle node.
Cheers,
Lexi
--
Id. Czmn Lnjzqnina, nIze XjoT, Alnstzdqaud. 73, 50672 Kfzcq
BX Kfzcq TDO 58720, Xzastbzpuapvztdvqx: Jnstbzc Jzduzqa
| Tboz qvq, bst! Ltncfafltnz, Yvdnauzdzn vqi Jzinwnq,
| Vqi cznizd bvst Utzfcfxnz! Ivdstbva auvinzdu, jnu tznaazj Ozjvztq.
| Ib auzt nst qvq, nst bdjzd Ufd! Vqi onq af kcvx bca gnz wvefd;
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/