[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] Paper on how DNS affects Tor's anonymity



My colleagues and I published a (not yet peer-reviewed) research paper
on how DNS affects Tor's anonymity.  The key parts of our work are:

- We measure the DNS setup of exit relays over time, showing that at
  times Google got to see almost 40% of DNS requests coming out of Tor.

- We show how website fingerprinting attacks can be augmented with
  observed DNS requests, resulting in precise attacks for unpopular
  websites.

- Similar to the "Users Get Routed" work, we simulate the impact of our
  attack at Internet-scale using the TorPS simulator.

The PDF is available online:
<https://nymity.ch/tor-dns/tor-dns.pdf>

Our project page has code, data, and replication instructions:
<https://nymity.ch/tor-dns/>
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev