a little bird told me
Eugen Leitl
eugen at leitl.org
Tue Dec 6 05:50:06 PST 2005
On Tue, Dec 06, 2005 at 08:29:52PM +0700, Jay Listo wrote:
> well, not sure if Tor has a mechanism to find out who's operating the
How can you find out who's operating the exit nodes, unless you
know the operators personally? The system is designed to
tolerate a certain fraction of Mallory operators.
> 'exit' nodes, and the ability to choose a specific exit node.
IIRC, the client builds the circuits.
> This way, any govt (or many govts) could put up a bunch of exit nodes
Tapping and traffic analysis upstream of existing nodes are far
less instrusive.
What I'm wondering is whether the claimed attack is due to a
design fault, or just by throwing resources at it. If it's a design
issue, it can be fixed. If it's a brute force approach, it shows
how much they're willing to deploy on very little incentive.
If it's a canard, they're trying to stall and destabilize.
Knowing which would be useful.
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
More information about the Testlist
mailing list