[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: de-Tor-iorate Anonymity

----- Original Message ----
From: F. Fox <kitsune.or@xxxxxxxxx>
To: or-talk@xxxxxxxxxxxxx
Sent: Thursday, May 29, 2008 9:24:09 PM
Subject: Re: de-Tor-iorate Anonymity

In particular, I found this line interesting:

"as well as show results from *A* Tor network that reveals the paths
that data travels when using Tor. This method can make using the Tor
network no more secure than using a simple open web proxy."

Notice the A in asterisks. This makes me think that the attack may have
been done on a private Tor network (rather than the main, public one).

If that's true, it's a far cry from carrying it out on the real Tor
network. Conditions are far more chaotic, and - most importantly - nodes
are spread out over many jurisdictions, in different countries, under
the control of many parties.
----- End Original Message ----

Attacking the main public Tor network would have massive ethical repercussions. They should, of course, address the scalability of their attack vector.