[tor-relays] Current state of HSDir attacks on hidden services
Isaac Grover, Aileron I.T.
igrover at aileronit.com
Thu Dec 13 13:35:49 UTC 2018
Good morning Jon,
In addition to fingerprint correlation and AS choice, I also recall reading this paper about identifying hidden services using clock skew based on internal CPU temperature: https://murdoch.is/papers/ccs06hotornot.pdf . The paper is older, but I'm curious if such an attack method is still effective?
Make your day great,
Isaac Grover, Senior I.T. Consultant
Aileron I.T. - " Because #ProactiveIsBetter "
O: 715-377-0440<tel:715-425-0440>, F:715-690-1029<tel:715-690-1029>, W: www.aileronit.com<http://www.aileronit.com/>
LinkedIn: https://www.linkedin.com/in/IsaacGrover/
YouTube: https://www.youtube.com/channel/UCqrwZNFKdR-guKtuQzFPObQ
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20181213/3d19108a/attachment.html>
More information about the tor-relays
mailing list