[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Once again: Tor timing attacks and a Tor confession
- To: [email protected]
- Subject: Once again: Tor timing attacks and a Tor confession
- From: [email protected] (rysiek)
- Date: Sun, 06 Mar 2016 16:19:05 +0100
- In-reply-to: <CAD2Ti2-myht8_zrVJ3Du+XKdLPs1Qi-MUZfLRnoLth1CttVzXA@mail.gmail.com>
- References: <[email protected]$> <[email protected]> <CAD2Ti2-myht8_zrVJ3Du+XKdLPs1Qi-MUZfLRnoLth1CttVzXA@mail.gmail.com>
Hi,
Dnia poniedziaÅ?ek, 29 lutego 2016 16:57:02 grarpamp pisze:
> > My preferred solution: Defund the the agencies that can and
> > almost certainly do defeat all current network anonymity
> > protocols. My program for accomplishing this objective: Wait.
> > They are hell bend on self destruction and Nature will provide.
>
> You'll be dead by then. It's more fun to risk dying now ;)
My personal solution of choice would also be defunding, but I believe this
needs some help to happen.
> Tor is looking at some forms of network fill traffic, which may
> or may not be integrated to the entire network wide sense, or
> useful in your own designs...
I was thinking (and I'm sure somebody else also got the idea) that maybe
combining ideas from Tor with ideas from BotTorrent might be a way to go.
Distribute the stuff people access among people accessing it and it becomes
harder to do timing attacks, and the network might work a bit faster too.
However, it's basically running full speed into one of the two hard problems
in IT -- cache invalidation. So, I don't know.
--
Pozdrawiam,
MichaÅ? "rysiek" Woźniak
Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 931 bytes
Desc: This is a digitally signed message part.
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20160306/6e017d65/attachment.sig>