[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10969 [Core Tor/Tor]: Set of guard nodes can act as a linkability fingerprint
#10969: Set of guard nodes can act as a linkability fingerprint
-------------------------------------------------+-------------------------
Reporter: asn | Owner:
| mikeperry
Type: defect | Status: closed
Priority: High | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution: fixed
Keywords: tor-client, tor-guard, XKEYSCORE, | Actual Points:
prop259, SponsorU-deferred, QUICKANT |
Parent ID: | Points: large
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Changes (by cypherpunks):
* status: reopened => closed
* resolution: => fixed
Comment:
Replying to [comment:40 cypherpunks]:
> Hi isis, I'm again reopening this ticket because the fundamental problem
in the title and description ("set of guard nodes can act as a linkability
fingerprint") remains unfixed.
>
> I just checked a friend's laptop (Debian stable, tor 0.2.9.11-1~deb9u1)
and when it got online it immediately connected to four guards. I don't
know why, but I suspect it's because (like most laptops) it is sometimes
not connected to the internet. (Some time later, it remained connected to
two of them.)
Sorry but that doesn't disprove what Isis said, Prop271 was implemented in
Tor 0.3.0.x and not 0.2.9.x which your laptop's friend had.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10969#comment:41>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs