[tor-dev] Should cloud-hosted relays be rejected?
isis
isis at torproject.org
Tue Sep 1 00:37:37 UTC 2015
Philipp Winter transcribed 2.6K bytes:
>
> The harm caused by cloud-hosted relays is more difficult to quantify.
> Getting rid of them also wouldn't mean getting rid of any attacks. At
> best, attackers would have to jump through more hoops.
>
Does anyone know which attacks were carried out via relays running on cloud
platforms?
The only one I remember was the "One cell is enough" [0] tagging attack in
2009, but IIRC, their malicious/colluding exit was run on PlanetLab (also, via
the nature of the attack, it probably wouldn't have caused any harm to real
users). Were there any others?
[0]: https://blog.torproject.org/blog/one-cell-enough
--
♥Ⓐ isis agora lovecruft
_________________________________________________________
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1240 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150901/38901bd1/attachment.sig>
More information about the tor-dev
mailing list