[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Question for those who say "Tor is pwned"



Not a specialist with gnunet (how does peers discovery works with
gnunet?) but one question can be: if you are using onion routing then
why are you using gnunet?

I would put a bemol on the (generally widely propagated) statement that
a DHT is necessarily insecure and not resistant to sybil attacks, in the
Peersm case the nodeIDs are temporary and related to the onion keys of
the peers (so sybils can not position themselves where they like in the
DHT, which from some research is maybe not enough but makes sybils' work
difficult for sure), they expire after each session, the DHT does not
contain direct information about the peers but what the peers know about
others (ie what the rdv points know about how to reach others), in
addition the peers are informing themselves directly about what they
know (the rdv point to reach this peerID and/or the introduction point
to establish WebRTC connections between two peers), the DHT is used only
if nothing is known about a peer, so sybils should invade both layers
which seems quite unlikely.

As a corollary your section "Onion routing the secushare way" is similar
to Peersm, as well as the concepts that 3 hops are not required (2 for
Peersm), indeed a peer can't know its position in the path, in addition
for Peersm the peers are acting as rdv points AND peers, and circuits
can "extend" from a rdv point to others (A wants to reach D, B knows
from C that C knows how to reach D, the path goes through two rdv points
B and C, each point being connected via two hops), so they can't even
know if they are serving the data as the first rdv point acting as a
peer, relaying it as the first rdv point, or relaying it as the nth rdv
point, or serving it through n rdv points

Tor in his current form will never allow to do p2p, as commented here
again:
https://lists.torproject.org/pipermail/tor-talk/2016-June/041529.html,
the only fact that nodes will not extend to nodes that are not
registered in the directories just makes this impossible, but as your
onion routing solution or mine show we don't need it.

Le 21/06/2016 Ã 19:39, carlo von lynX a Ãcrit :
> On Tue, Jun 21, 2016 at 12:48:38PM -0400, Paul Syverson wrote:
>> Well there's things like alpha-mixing (better tau-mixing) as that
> Yes, alpha-mixing would be a great step forward I guess.
> Would you say the things I wrote on http://secushare.org/anonymity
> regarding not building future work on Tor are accurate?
> I wouldn't like to be stating anything stupid in there.
>

-- 
Get the torrent dynamic blocklist: http://peersm.com/getblocklist
Check the 10 M passwords list: http://peersm.com/findmyass
Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk