[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] On the visualization of OONI bridge reachability data



isis transcribed 6.6K bytes:
>    * The hashed fingerprint (as is the case for bridges in onionoo)
>    * The hashed ip:port

Actually, my apologies, I was quite tired when I wrote this and totally
completely wrong.

A hashed ip:port would be a terrible idea because IPv4 space is only 2^32 and
ports are 2^16. In total that's a 2^48 message space. Hashing for a preimage
to get the bridge addresses in quite feasible in those constaints, as well as
precomputing the attack offline.

We should come up with a different way to hide ip:ports.

-- 
 ââ isis agora lovecruft
_________________________________________________________
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev