27C3 on Tor
Sebastian Lechte
seb at stian.lechte.net
Wed Dec 29 10:23:35 UTC 2010
> Users themselves can guard against this type of fingerprint-based
> eavesdropping relatively easily, Herrmann noted. Downloading or requesting
> more than one site at a time through the network will muddy the pattern
> enough that certainty will be very difficult for the eavesdropper to
> establish.
And I thought this was why it says somewhere in DOCs or FAQ that a user
can better hide what she does if her own tor client also transmits relay
traffic. This is the strongest point of tor against other anon systems
with less users: The more people use it, the more likely it "wasn't me".
It would be interesting to experiment if a relatively low RelaySpeed
(e.g. 10KB/s) setting would already attract enough traffic to always
sufficiently hide the users own activities.
Sebastian
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list