Marc Juarez: > I think website fingerprinting is one of the most threatening attacks to > Tor because it can be deployed with moderate resources and the > information that can be extracted as a result is highly sensitive (e.g., > browsing history). It basically defeats one of the main privacy > guarantees offered by Tor which is unlinkability between sender and > recipient or, in this particular case, between the user and the web > server. However, I couldn't find any open project that tackles this > problem in > https://www.torproject.org/getinvolved/volunteer.html.en#Projects. That > is why I'd like to propose a GoSC project for the implementation of > tools (packages, classes, etc.) that contribute in the development of a > countermeasure against this attack. Have you read Mike Perry's long blog post on the topic? https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks It outlines future research work in evaluating the efficiency of fingerprinting attacks, and also mention a couple of promising defenses. -- Lunar <lunar@xxxxxxxxxxxxxx>
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev