Possible attack method?? Question..
    Jon McLachlan 
    mcla0181 at umn.edu
       
    Fri Jan 11 22:02:28 UTC 2008
    
    
  
(please correct me if I'm incorrect but...)
if the adversary controls your entry-guard (which is nearly impossible 
to detect and considered a 'strong' adversary)
if the adversary controls input to your tunnel (like text in an email, 
which is easy)
and, if you do not use end to end encryption,
Then, the adversary can perform traffic analysis on the exit node, and 
the adversary can easily discover your true ip.
~Jon
    
    
More information about the tor-talk
mailing list