[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Idea: Public verification of exit nodes and their maintainers - Fwd: [tor-relays] specifying your own entrance and exit nodes



grarpramp,If Tor only consisted of hidden services, wouldn't this class of traffic-fudging problems go away? (I'm assuming the handful of centralized services most people use would just generate vanity addys.)
-Jonathan 

     On Thursday, December 11, 2014 11:52 AM, grarpamp <grarpamp@xxxxxxxxx> wrote:
   

 From the exact same thread duplicated a month ago that is worth
reading for what everyone said there:


Assume you have a base set of some web of trusted nodes, which
is then easier/cheaper for an adversary on average...

A) Sybil up enough individual faces that can prove own their node
in person at meetups, give google checkable stories, are networked
in Tor/related communities enough, and pass the human bullshit
detector... to have an effective attack percent of nodes, maintained
as the "legit" node count grows.

B) Pay $/mo per IP to "cooperative" ISP's (or be a shell), to sybil
up nodes you have zero insight into other than an IP address.

Then consider which trust metrics you might use in your config.
Sure, many caveats too, if the above ancient question has an answer,
then so do you.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


    
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk