"Low-Resource Routing Attacks Against Anonymous Systems"

James Muir jamuir at scs.carleton.ca
Mon Feb 26 18:47:25 PST 2007


James Muir wrote:
>No one seems to have posted this to the list yet, so I thought I should:
>
>"Low-Resource Routing Attacks Against Anonymous Systems",
>K. Bauer, D. McCoy, D. Grunwald, T. Kohno, D. Sicker
>Technical Report, University of Colorado
>
>http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-0
7.pdf
>
>
>It was posted on Slashdot:
>
>http://yro.slashdot.org/yro/07/02/25/1913219.shtml

For those interested, here is someone's official response about the
Technical Report and its implications for the Tor network:

http://blogs.law.harvard.edu/anonymous/2007/02/26/the-rumors-of-our-demise/

Does anyone know who authored that?  It seems a bit strange to have an
anonymous official statement, but maybe this is appropriate for Tor ;-)

Here is an FAQ by one of the Tech Report's authors:

http://home.cs.colorado.edu/~bauerk/faq.html

-James

----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]





More information about the cypherpunks-legacy mailing list