Overlay Networks: Research Improvements and Attacks [was: planetlab butterfly relays]
grarpamp at gmail.com
Wed Jan 23 15:46:21 PST 2019
On 1/23/19, nusenu <nusenu-lists at riseup.net> wrote:
> thanks for adding tor relays.
> If you are using them for research purposes please ensure
> you follow the safety guidelines:
> | Up | Ext | JoinTime | Nickname | Version | IP |
> AS | CC | ORp | Dirp | OS |
> Contact | eFamMembers | FP |
As many know, many guidelines regarding the stronger distributed
encrypted overlay and messaging networks out there are naturally
voluntary, and research and attacks are often generally unenforceable
and or undetectable when undertaken by qualified adversaries.
Many parties [publicly] subscribe to such guidelines,
many [silently] don't. That's the nature [and one of the
risks] of such networks, indeed of any network.
Such adversaries exist and are highly active and capable.
Know your adversary. Strengthen your designs to match
and best them.
As to the nodes, they're all planet-lab.net hosts, planetlab has
at least two known tor slices "okstate_tor" and "uml_ZhenLing",
some public research outputs [or not] of which might be listed below...
https://www.youtube.com/watch?v=9QsjkJcUznA MEMEX Christopher White
Jiangmin yu, Eric Chan-Tin:
Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks
Conference: 2018 IEEE 38th International Conference on Distributed
Computing Systems (ICDCS)
Identifying Webbrowsers in Encrypted Communications
Revisiting Circuit Clogging Attacks on Tor
Conference: Availability, Reliability and Security (ARES), 2013 Eighth
International Conference on
Application Of Data Analytics - Case Studies
More information about the cypherpunks