[tor-talk] Tor (and other nets) probably screwed by Traffic Analysis by now

grarpamp grarpamp at gmail.com
Thu Jun 2 08:32:45 PDT 2016


On 6/2/16, juanjo <juanjo at avanix.es> wrote:
> Something like this is what I feared when days ago I sent a message to
> this list... If you allow Tor Browser to have all hops from the same
> country, or the Tor network relies only on a few countries to host their
> nodes (Germany, US, France) then Tor will be useless soon...
>
> https://lists.torproject.org/pipermail/tor-talk/2016-May/040991.html

True regarding physical or network compromise of nodes,
however that is single purpose and not very efficient attack.

Instead, this is traffic analysis by GPA's and cooperating GPA's.
They have their illegal, unethical, multipurpose mass surveillance
network taps all over the planet. Even if your path was from Canada
in (to Venezuela to China to Russia out) to Mexico, they don't have
to have taps in any of those countries, only on transit that has
visability of the IP's / points of interest, typically just the endpoints.

There's nothing you can do about it but
- start researching and using networks that use fill traffic
- shut down those GPA's and their activities against you

It is those out of control self aware self preserving entities
with their secret games interpretations etc, that will lessen,
chill, and tax at your overall life, not random criminals
running about.

Background on public tech...
http://betanews.com/2016/05/26/microsoft-facebook-underwater-transatlantic-marea-data-cable/
http://arstechnica.com/information-technology/2016/05/how-the-internet-works-submarine-cables-data-centres-last-mile/



More information about the cypherpunks mailing list