[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Help me secure my setup
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Aeris <aeris+tor@xxxxxxxxxx>:
>> I don't want to
>> give out a correlation between time of starting the client and time of my
>> Tor activities.
>
> Event with always connected client, you can be correlated :
> online : more Tor traffic (consensus + circuit + data)
> offline : less Tor traffic (consensus only)
You're right...
I have one more question. What are the drawbacks of not preserving Tor
state directory between reboots? I reboot the router rarely, but it can
happen from time to time. I run Tor from ramdisk and I don't want it to
have any persistent storage - I want it to vanish completely as the router
shuts down.
One drawback that I see is that after every reboot, a new entry guard will
be selected and it can make correlation attacks easier. Maybe it would be
wise to copy old state file during each "Tor deployment" process (by which
I mean creating the ramdisk and copying Tor over the network to it from a
secure machine)?
- --
Oskar Wendel, o.wendel@xxxxxxxxxxxxxxxxx
Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C
Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C
-----BEGIN PGP SIGNATURE-----
iQEcBAEBAgAGBQJWk+ykAAoJEGaQzFIxjbhMExkH/2KT+L+ok21+G67IewMr4A7q
WNAwaaHKIzQePGEUImTxTNUBgUwtk45MlD0PmTgBLNcwT7FOuhJUCnl7s40Bdpk4
NfHvZYEY9xvZgm6ZQD7q62h9XN2fTSHNjR5s9Uc/EITQ7Gw+c+1UREedOgfHoSJX
GJhFNkt2yo/Ui8P4wQkOyvSrSaZHrIRONwMgUa9RAoemw8DNtyRn+mAxga/tvLzL
7Bvz/t9rrnAmv6TSot8Vw0KYt89PHeqoWcLIA1AZoc99cr5RK5GDt8oIhUFTp0BH
WlX23e6gQAAfkJcF5FVU3y5Pn+U92Gr+nPDZjDc0KbadUFKlNi59gE9ChP7//9s=
=2cYl
-----END PGP SIGNATURE-----
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk