a little bird told me

Eugen Leitl eugen at leitl.org
Tue Dec 6 05:50:06 PST 2005


On Tue, Dec 06, 2005 at 08:29:52PM +0700, Jay Listo wrote:

> well, not sure if Tor has a mechanism to find out who's operating the

How can you find out who's operating the exit nodes, unless you
know the operators personally? The system is designed to
tolerate a certain fraction of Mallory operators.

> 'exit' nodes, and the ability to choose a specific exit node.

IIRC, the client builds the circuits.

> This way, any govt (or many govts) could put up a bunch of exit nodes

Tapping and traffic analysis upstream of existing nodes are far
less instrusive.

What I'm wondering is whether the claimed attack is due to a
design fault, or just by throwing resources at it. If it's a design
issue, it can be fixed. If it's a brute force approach, it shows
how much they're willing to deploy on very little incentive.
If it's a canard, they're trying to stall and destabilize.

Knowing which would be useful.

--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]





More information about the Testlist mailing list