[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: end-to-end encryption question



On 9/13/07, Scott Bennett <bennett@xxxxxxxxxx> wrote:
>...
>      Yes.  However, in the case of end-to-end encryption, the attacker
> would first have to have a way to know with which packets to tamper,
> which would mean the attacker would have to have cracked the tor system
> entirely.

please read a bit more about the Tor design and implementation.  it is
trivial to know if a client is trying to reach a directory authorities
or nodes caching directory information based on the router info
published.


>...  If the data in question travel all the way to their
> destination through a tor circuit, then they are encrypted, mingled
> with other tor traffic, and not obviously distinguishable from any
> other packets traversing the tor network.

you still need to bootstrap them into the network to be able to create
circuits this way.  see AllDirActionsPrivate and some of the new
bridge features recently developed.

best regards,