On Tue, Dec 06, 2005 at 08:29:52PM +0700, Jay Listo wrote:
well, not sure if Tor has a mechanism to find out who's operating the
How can you find out who's operating the exit nodes, unless you know the operators personally? The system is designed to tolerate a certain fraction of Mallory operators.
'exit' nodes, and the ability to choose a specific exit node.
IIRC, the client builds the circuits.
This way, any govt (or many govts) could put up a bunch of exit nodes
Tapping and traffic analysis upstream of existing nodes are far less instrusive. What I'm wondering is whether the claimed attack is due to a design fault, or just by throwing resources at it. If it's a design issue, it can be fixed. If it's a brute force approach, it shows how much they're willing to deploy on very little incentive. If it's a canard, they're trying to stall and destabilize. Knowing which would be useful. -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]