[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor browser can be fingerprinted
On Wed, Sep 11, 2013 at 12:50:41PM -0400, Marthin Miller wrote:
> 1024bit RSA keys which can be cracked in a few hours
I believe this to be false currently.
(But that doesn't mean we shouldn't fix it, because it will become true
some time in the next few decades, and we don't know when that will be.
(Good thing we're fixing it.))
> Also if you let users choose how much security they want that's better
>(for example choose high padding and time delay on relays if security
>have more priority than speed)
Unfortunately, this one is more complex than you imply as well. Take a
look at "Anonymity Loves Company: Usability and the Network Effect"
for much more discussion here:
http://freehaven.net/anonbib/#usability:weis2006
--Roger
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk