The cheap low risk node majority attack, pki, geoip, etc

juan juan.g71 at gmail.com
Tue Jun 7 20:30:31 PDT 2016



Users Get Routed:
Traffic Correlation on Tor by Realistic Adversaries

http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf


Our results show that Tor users are  FAR MORE SUSCEPTIBLE to compromise
than indicated by prior work. 


QUITE SIMPLE AND EFFICIENT TECHNIQUES CAN CORRELATE TRAFFIC
at these separate locations by taking advantage of identifying traf-
fic patterns [29]. As a result, the user and his destination may be
identified, completely subverting the protocol’s security goals.


Given the SEVERITY OF THE TRAFFIC CORRELATION PROBLEM and its se-
curity implications, we develop an analysis framework for evaluat-
ing the security of various user behaviors on the live


OUR ANALYSIS SHOWS THAT 80% OF ALL TYPES OF USERS MAY BE DE-
ANONYMIZED BY A RELATIVELY MODERATE TOR-RELAY ADVERSARY WITHIN SIX
MONTHS.


OUR RESULTS ALSO SHOW THAT AGAINST A SINGLE AS ADVERSARY
ROUGHLY 100% OF USERS IN SOME COMMON LOCATIONS ARE DEANONYMIZED
WITHIN THREE MONTHS (95% IN THREE MONTHS FOR A SINGLE IXP)


signed paul FUCKING syverson


Now, all the RETARDS who parrot that 'tor stinks' perhaps should try to
update their mental databases.











More information about the cypherpunks mailing list