[tor-dev] GoSC - Website Fingerprinting project
Lunar
lunar at torproject.org
Tue Mar 11 09:11:05 UTC 2014
Marc Juarez:
> I think website fingerprinting is one of the most threatening attacks to
> Tor because it can be deployed with moderate resources and the
> information that can be extracted as a result is highly sensitive (e.g.,
> browsing history). It basically defeats one of the main privacy
> guarantees offered by Tor which is unlinkability between sender and
> recipient or, in this particular case, between the user and the web
> server. However, I couldn't find any open project that tackles this
> problem in
> https://www.torproject.org/getinvolved/volunteer.html.en#Projects. That
> is why I'd like to propose a GoSC project for the implementation of
> tools (packages, classes, etc.) that contribute in the development of a
> countermeasure against this attack.
Have you read Mike Perry's long blog post on the topic?
https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
It outlines future research work in evaluating the efficiency of
fingerprinting attacks, and also mention a couple of promising defenses.
--
Lunar <lunar at torproject.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20140311/0aee2164/attachment.sig>
More information about the tor-dev
mailing list