16 May
2006
16 May
'06
5 p.m.
Thus spake Damian Gerow (dgerow@afflictions.org) [16/05/06 16:44]: : Especially since "Tor's DH key authentication of nodes and TLS tunnels" : would ensure data integrity, all you'd have to do is hash the incoming : packets, and see where they come out. Reply to myself: this is actually incorrect and misleading. However, the fact that their own threat model dictates they cannot protect against a 'global eavesdropper' means they're vulnerable to this type of attack.