[tor-relays] attacks from problematic tor exit relays
Amadeus Ramazotti
cryptoquantumhammer at gmail.com
Thu Dec 31 14:43:35 UTC 2020
hey,
there is a decent amount of academic research papers on this very question.
If I remember correctly the tor project homepage does offer some resources.
Some of these papers are quite technical, but even as a non infosec professional I was able to get the basic concept most of the times.
greets
> On 24 Dec 2020, at 11:10 PM, BRBfGWMz <brbfgwmz at concealed.company> wrote:
>
> I am trying to guess what kind of target attacks are possible through problematic relays.
>
> Suppose the network relay is controlled by the enemy.
>
> How do they determine the original IP address of the outbound traffic? Correlation attacks are possible, but they seem very difficult and probably require a lot of resources. Also, changing the route stops this.
>
> If I assume that they determine what traffic flow is mine, and that I always use the same route, what attacks are possible? Are there any good posts or videos?
>
>
>
> --
> Sent using MsgSafe.io's Free Plan
> Private, encrypted, online communication
> For everyone. www.msgsafe.io
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20201231/55c38068/attachment.htm>
More information about the tor-relays
mailing list