[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Hacker strikes through student's router
by adding a protocol to signify persisting connections (so that while a
circuit operates it is recognised as such) and a single signature check at
the beginning of the circuit establishment. sure it will add *some* load to
the server's cpu but the verification only has to be done once every 15
minutes per user at the most.
From: Eugen Leitl <eugen@xxxxxxxxx>
Subject: Re: Hacker strikes through student's router
Date: Fri, 11 Nov 2005 11:51:41 +0100
On Fri, Nov 11, 2005 at 10:47:24AM +0000, loki tiwaz wrote:
> or how about don't bother with the electronic cash thing, make a
> which signifies that the packet originated from a tor server and have
> packets prioritised. then the p2p folks will be more likely to set up
How do you propose to prove that the packet originated from a bona fide
Tor server, without agoric load leveling?
> (being that they mostly have bulk bandwidth, they are a good target)
> set up more nodes because of the advantage of the bandwidth being more
> available to them if they run a node.
Eugen* Leitl <a href="http://leitl.org">leitl</a>
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
<< signature.asc >>
Express yourself instantly with MSN Messenger! Download today it's FREE!