[TWN team] Updates to the wiki pages
dan
hack at riseup.net
Tue Sep 3 06:11:46 UTC 2013
What's the story behind these update emails? Are they reporting every
change or just major ones?
Lunar:
> ***************************************************************************
> CHANGED: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/9
> ***************************************************************************
> --- @ Tue, 03 Sep 2013 04:05:03 +0000
> +++ @ Tue, 03 Sep 2013 06:05:03 +0000
> @@ -70,35 +70,6 @@
> this November in Berlin, Aaron Johnson, Chris Wacek, Rob Jansen, Micah
> Sherr, and Paul Syverson described in a very well written paper their
> experiments on traffic correlation attacks.
> -
> -Like any low latency anonymity network, Tor is vulnerable to âan
> -adversary that can observe a userâs traffic entering and exiting the
> -anonymity network.â The paper extensively review previous
> -litterature about this issue. But two angles used by the authors are of
> -particular interests:
> -
> -First, they are trying to model a âmore realistic adversary who monitors
> -a fixed set of ASes or IXPs.â Second, they have tried to use metrics
> -that can answer the following questions: âIf I use the system in the
> -following way, how secure am I?â or âHow much can I do the following
> -while maintaining security at least to level foo?â
> -
> -Tor has users in the real world, with real world adversaries. Both
> -have resources that are limited to some extents, and it is good to
> -give Tor users a better chance to estimate their risks and necessary
> -tradeoffs.
> -
> -This lead the paper to focus on two class of attacks: âmalicious relay
> -operators or networks that monitor traffic as it enters and exits Tor.â
> -
> -One finding is that âan adversary who runs one guard relay and one
> -exit relay with 83.3 MiB/s and 16.7 MiB/s of bandwidth respectivelyâ has
> -â80% chance of deanonymization within 6 monthsâ for a first stream.
> -
> -They also studied how an adversary controlling one or more ASes, or an
> -Internet eXchange Point. 80% of the modeled IRC users can have their
> -first stream deanonymized by an adversary controlling two ASes after 43
> -days.
>
> The author concludes with the following: âOur results do suggest that
> current users of Tor should carefully consider if it meets their
> @@ -217,6 +188,8 @@
> 8.html
> Arlo Breault https://lists.torproject.org/pipermail/tor-reports/2013-September/0
> 00319.html
> +Philipp Winter https://lists.torproject.org/pipermail/tor-reports/2013-September
> +/000320.html
>
> Help Desk Roundup
> -----------------
> @@ -298,7 +271,10 @@
>
> Upcoming events
> ---------------
> -
> +Sep 4 8pm | Tor Q&A with Roger Dingledine
> + | University of the Sciences, Philadelphia, PA
> + | http://www.phillylinux.org/meetings.html
> + |
> Sep 29-01 | Tor at OpenITP Circumvention Tech Summit IV
> | Berlin, Germany
> | https://www.openitp.org/openitp/circumvention-tech-summit.html
>
> ***************************************************************************
>
>
>
>
> ________________________________________________________________________
> Tor Weekly News coordination mailing-list
>
> To unsubscribe or change other options, please visit:
> https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
>
More information about the news-team
mailing list