[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Timing attacks and fingerprinting users based of timestamps



So i was thinking about timing attacks and simular attacks where time is a Big factor when deanonymizing users . 
and created a Little script that will generate a ipv4 address and send a get request to that address https://github.com/flipchan/Nohidy/blob/master/traffic_gen.py then delay x amount of seconds and do it again. This will probelly make it harder for the attacker to fingerprint the users output data due to the increased data flow coming out from the server. 

So to protect against traffic timing attacks and simular would be to generate More data.

Has anyone else got any other solution for these kinds of attacks?

Take care
-- 
Sincerly flipchan 
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk