[tor-talk] Padding effective against simple passive end-to-end correlation attacks?
Raynardine
raynardine at tormail.org
Sun Jan 27 03:26:53 UTC 2013
On 1/26/2013 8:57 AM, adrelanos wrote:
> Question:
> Isn't it significantly more difficult for the adversary to find out who
> is behind Alice's actions, when choosing Behavior B? It gets more
> difficult than just comparing time stamps?
I think that dummy traffic on sustained circuits to one's entry guards
is a good idea.
You could make it an optional feature in torrc.
I would also suggest garlic routing as an optional feature, by this I
mean introducing very small delays in order to transmit bundles of
transmissions together in order to make traffic analysis and correlation
significantly more expensive and tedious for the adversary.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 728 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20130126/e747e9c3/attachment.pgp>
More information about the tor-talk
mailing list