[tor-dev] Special-use-TLD support
Tim Wilson-Brown - teor
teor2345 at gmail.com
Tue Sep 29 07:42:54 UTC 2015
> On 29 Sep 2015, at 09:39, Jeff Burdges <burdges at gnunet.org> wrote:
>
>> The issue I do see is that SPV validation doesn't work well unless
>> you
>> ask multiple peers to make sure that you're getting the chain with
>> the
>> most PoW. So I gather that this would require connecting to Namecoin
>> peers running on multiple exit nodes. I don't think that's
>> problematic, but it would have to be taken into account.
>
> This is no different from validation for existing DNS results. Tor
> attempts to prevent this by building a list of bad exits, but it's
> challenging to catch an exit that attacks only one website.
>
> You could check multiple peers but that costs you some anonymity. If
> you use many .bit names, this might expose the fact that you use
> Namecoin to your guard.
How do you anticipate this exposure happening? Via traffic correlation?
As far as I understand, your guard only sees your encrypted traffic, and not your exit(s) or your DNS queries.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150929/1fb91adb/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 873 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150929/1fb91adb/attachment.sig>
More information about the tor-dev
mailing list