[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10969 [Tor]: Set of guard nodes can act as a linkability fingerprint
#10969: Set of guard nodes can act as a linkability fingerprint
-------------------------+-------------------------------------------------
Reporter: asn | Owner:
Type: task | Status: new
Priority: normal | Milestone: Tor: 0.2.6.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-client, tor-guards,
Actual Points: | 026-triaged-1
Points: | Parent ID: #11480
-------------------------+-------------------------------------------------
Comment (by cypherpunks):
Not using guards (setting {{{UseEntryGuards 0}}}) actually means you'll
pick a new entry node for every circuit. This will greatly reduce the
amount of time it takes for you to eventually pick a malicious relay as an
entry node. If you're concerned about this issue but aren't using one of
the tools linked above, a better option (than {{{UseEntryGuards 0}}}) is
to leave UseEntryGuards enabled (the default) but stop tor and nuke your
state file to get a new set of guards whenever you physically relocate.
Is there any progress on fixing this properly? Or are you waiting to see
some XKEYSCORE fingerprints showing that this linkable information is
actually being linked?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10969#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs