[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Trying Trusted Tor Traceroutes



Dear list members,

We are happy to present the preleminary analysis results from TTTT:

http://arxiv.org/pdf/1410.1823v1.pdf

The conclusions are:

1. We have found that AS-path prediction techniques significantly overestimate ASes and IXes traversed by Tor traffic, calling into question the results of previous evaluations of the network-level adversary threat. 

2. Our simulations show that Tor may currently be less vulnerable to an AS or IXP adversary than has been previously found. We also find that proposed path-selection algorithms to avoid a network adversary still leave a significant chance for users to be deanonymized over time due to the errors in path prediction, and these algorithms lead to significant rates of connection failures, even though in the large majority of cases the failures could be avoided with better measurement. 

3. Thus our results suggest the importance of accurate measurement both for understanding Tor security and for improving it.

--
Mit freundlichen Grüssen / Sincerely yours

Sebastian Urbach

-----------------------------------------
Definition of TOR:
10% luck, 20% skill, 15% concentrated
power of will, 5% pleasure, 50% pain and
100% reason to remember the name!
-----------------------------------------


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays