[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] List of ways to attack Tor
On Thu, Jan 05, 2017 at 12:25:20PM +1030, email@example.com wrote:
> I'm tasked with doing a short report on the ways in which Tor can be
> I've brainstormed and done research for few hours and this is the
> list I've come up with.
> Is there anything big that I've missed?
> I feel I might be a bit light on more technical attacks.
Your list is pretty good, though it could do with some sorting and
some categories. :)
For another interesting set of attacks, see
These talks are some years old now, but many of the issues the talks
describe are hard to fix well so they remain an issue in some form.
If I were doing your 'short report', I would try to prioritize the various
attacks in terms of how hard they are to perform, and how damaging they
are if performed. You could imagine a two-dimensional graph where various
attacks correspond to a point on the graph.
I would also want to include a short section on how having a big list of
possible attacks does not indicate that it's a weaker system or weaker
design compared to a system or design that has a shorter but scarier list
of attacks. For example, centralized architectures don't need to think
about the more esoteric attacks, because they have the whole dataset of
what users went to which website right in front of them:
Let us know what you come up with,
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to