[tor-talk] Anonymity of Leaking Servers (Was Re: [tor-dev] "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization")
Low-Key²
cryptic303 at yahoo.com
Thu May 30 23:38:41 UTC 2013
----- Original Message -----
> Is that important for Strongbox? I don't think Strongbox's threat model
> needs the document upload server to *be* anonymous.
I can see why it would be important for preventing end to end correlation. Given the recent example of the massive grab of phone data from the DOJ, if they knew where the server was located and had suspects in mind, it would make end to end correlation a lot easier for the purposes of identifying a leaker. So, if the New Yorker is actually serious about preventing that, and regularly moved the keys around to different servers, they could stay ahead of governments looking to use end to end correlation by merely monitoring the New Yorker's site in addition to anyone they fear may leak data.
More information about the tor-talk
mailing list