Tor Stinks re Traffic Analysis and Sybil (as do other networks)

Punk-Stasi 2.0 punks at tfwno.gf
Mon Nov 25 20:45:21 PST 2019


On Mon, 25 Nov 2019 20:56:09 -0700
Mirimir <mirimir at riseup.net> wrote:

> On 11/25/2019 08:07 PM, Punk-Stasi 2.0 wrote:
> > On Tue, 26 Nov 2019 00:58:09 +0000
> > Peter Fairbrother <peter at tsto.co.uk> wrote:
> > 
> >>
> >>
> >> It should be noted that NSA do not say they can break TOR in practice, 
> >> and afaik there is no evidence that they have.
> > 
> > 	yeah, the NSA can't break tor but some random university can 
> > 
> > 	https://www.vice.com/en_us/article/d7yp5a/carnegie-mellon-university-attacked-tor-was-subpoenaed-by-feds
> 
> That bug was patched. But there obviously could be others. And the NSA
> does tend to stockpile 0days.
> 
> Also, one wonders how long the NSA etc had used the bug that CMU exploited.


	here, yet another attack 

	https://www.freehaven.net/anonbib/cache/circuit-fingerprinting2015.pdf
	Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services

	and the introduction to that article states

	"over the past few years, hidden services have witnessed various active attacks in the wild [12, 28], resulting in several takedowns [28]" 

	but hey, the nsa can't break tor..
	









More information about the cypherpunks mailing list