[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: SPD talk: "Simulating a Global Passive Adversary for Attacking Tor-like Anonymity Systems"?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: SPD talk: "Simulating a Global Passive Adversary for Attacking Tor-like Anonymity Systems"?
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Thu, 12 Jun 2008 13:46:56 -0700
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 12 Jun 2008 16:47:09 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=yGAeug0g9ergrzalOGTDVeN8Uo49o6GOrfekDI4nJXM=; b=VGIhS+56t9LfwmdIIcTr2mNLqBNm5watzi744HYrR0p3AVj7elg4kKf9TJonb6cGQZ LrUvcg8CnBPra4TvyY8EuVZURppNBy/N6ooFJp4B3PuqnYCrgeUXdv1ub37iMl1b/i/Z uHtw88WXZfP+nOkhUZ4ypf9b+OkiTKATD3Hxg=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=HSVTiL2Y4nTAiLYljkR0JSPIj85I0Cdth4daqS61RA3h7tK3OkvY2MEBPZxl5CfkkW 4IyGZF0ohyRSefIDxZarxMPQO6sobacRWkevpLxaCLcf8EVTGRRcPTiRU6aAwEU2k1+K MHiOmzfq7PrAv+G3J2vu324vcWitN8TLjpZoM=
- In-reply-to: <1213242981.24407.1258034365@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- References: <1213242981.24407.1258034365@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mozilla-Thunderbird 2.0.0.14 (X11/20080509)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
gojosan@xxxxxxxxxxxxx wrote:
> I just noticed this talk at the Security and Privacy Day from May 2008.
> While I understand that Tor's thread model does not defend against a GPA
> I am still curious what effect this attack can have against the current,
> real Tor network?
>
> Simulating a Global Passive Adversary for Attacking Tor-like Anonymity
> Systems
> http://web.crypto.cs.sunysb.edu/spday/
>
(same old attack snipped)
We've heard about this attack several times, and have had at least a
couple discussions.
As more and more time goes by, I'm inclined to think it's either
complete vapor, or just an impotent variation on an existing attack.
FUD is easy to spread, considering what Tor is for, and who it protects;
I've seen so much of it that when a "new attack" comes along, I say,
"Proof plox." =:oD
- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=n3pf
-----END PGP SIGNATURE-----