[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] List of ways to attack Tor
On 2017-01-05 13:13, Roger Dingledine wrote:
On Thu, Jan 05, 2017 at 12:25:20PM +1030,
I'm tasked with doing a short report on the ways in which Tor can be
I've brainstormed and done research for few hours and this is the
list I've come up with.
Is there anything big that I've missed?
I feel I might be a bit light on more technical attacks.
Your list is pretty good, though it could do with some sorting and
some categories. :)
For another interesting set of attacks, see
These talks are some years old now, but many of the issues the talks
describe are hard to fix well so they remain an issue in some form.
If I were doing your 'short report', I would try to prioritize the
attacks in terms of how hard they are to perform, and how damaging they
are if performed. You could imagine a two-dimensional graph where
attacks correspond to a point on the graph.
I would also want to include a short section on how having a big list
possible attacks does not indicate that it's a weaker system or weaker
design compared to a system or design that has a shorter but scarier
of attacks. For example, centralized architectures don't need to think
about the more esoteric attacks, because they have the whole dataset of
what users went to which website right in front of them:
Let us know what you come up with,
Thanks, those talks were very useful.
One question: Has the attack where the first hop refuses to extend
circuits, except to other relays under their control still a problem?
Has it been addressed apart from using guards?
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to