Sorry about that :-(
I think you're right, but it depends on your threat model: * an adversary with access to a router/IXP near your server could get precise bandwidth figures (bytes/second) that way; * an adversary anywhere in the world could see averaged bandwidth figures (kilobytes?/minute) using your graph. I could imagine your users facing either type of adversary. But there might be ways to work around that: * a public graph could average bandwidth over the time period used on Globe (6 hours), or * a private graph could provide as much detail as you like, and be made available over password-protected HTTPS, or as a hidden service with client authentication. Tim
Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F |
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays