[tor-talk] What if I connect to all nsa Tor nodes?
Noilson Caio
caiogore at gmail.com
Sun Sep 8 20:07:52 UTC 2013
in https://www.torproject.org/docs/faq#EntryGuards say:
...
So, what should we do? Suppose the attacker controls, or can observe,
*C*relays. Suppose there are
*N* relays total. If you select new entry and exit relays each time you use
the network, the attacker will be able to correlate all traffic you send
with probability *(c/n)2*. But profiling is, for most users, as bad as
being traced all the time: they want to do something often without an
attacker noticing, and the attacker noticing once is as bad as the attacker
noticing more often. Thus, choosing many random entries and exits gives the
user no chance of escaping profiling by this kind of attacker.
Today there are:
N = +/- 4000 [1]
C = number of relay (relay over ISP, traffic **between Ases and IXPS factor
) observed from NSA - are there studies that indicate the amount of relay,
ixps, isp, compromised by nsa?
thanks.
[1] - https://metrics.torproject.org/network.html
...
On Sun, Sep 8, 2013 at 3:28 PM, Nathan Suchy <
theusernameiwantistaken at gmail.com> wrote:
> Is it possible for me to force my client to connect to my tor exit as the
> middle node?
>
>
> On Sun, Sep 8, 2013 at 1:11 PM, Paul Syverson <syverson at itd.nrl.navy.mil
> >wrote:
>
> > On Sun, Sep 08, 2013 at 11:47:06AM -0400, Nathan Suchy wrote:
> > > Would my traffic still be secure?
> > >
> >
> > To do what, and secure against whom and to what degree?
> >
> > It is reasonable to assume that if NSA is running Tor nodes, then they
> > are probably using good operational security. So against someone
> > breaking into those nodes and then attacking you, you are probably
> > more secure than using random nodes. (But see below.)
> >
> > If you mean secure against the NSA node operators, then no. Any
> > adversary that owns all the nodes in your route should be able to
> > learn pretty much everything about your traffic patterns, who you're
> > talking to and when. This is true for the NSA or anybody else.
> >
> > If you mean intentionally selecting some subset of nodes because you
> > trust them more or because you are trying to avoid them as adversary
> > nodes, there is a tradeoff between the potential better security that
> > might provide and what your choice might reveal about you. cf.
> > "Trust-based Anonymous Communication: Adversary Models and Routing
> > Algorithms". There's currently research advances but no simple advice
> > on that score.
> >
> > This all assumes adversaries just live at the nodes rather than also
> > at the ISPs, the ASes, the IXPs, etc. It is hard to say anything more
> > about such an adversary without more details. You might want to see
> > "Users Get Routed: Traffic Correlation on Tor By Realistic
> > Adversaries" and some of the earlier work on this issue cited therein.
> >
> > HTH,
> > Paul
> > --
> > tor-talk mailing list - tor-talk at lists.torproject.org
> > To unsusbscribe or change other settings go to
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> >
>
>
>
> --
> Nathan Suchy
> If this email was not intended for you delete it and any copies you have of
> it. The email was intended for "FirstName LastName". Information in this
> email may be confidential and releasing it may be a violation of US law.
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
--
Noilson Caio Teixeira de Araújo
http://ncaio.wordpress
<http://ncaio.ithub.com.br>.com<http://ncaio.ithub.com.br>
http://br.linkedin.com/in/ncaio
http://www.commandlinefu.com/commands/by/ncaio
http://www.dicas-l.com.br/autores/noilsoncaioteixeiradearaujo.php
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQENBFIrMksBCACr0/NhLdhcVFP1b+hY9L0lI2PedkmxGDShrcxuqlEN7ezPPRLi
YZz/yrpBnOYcihozjE4u/ww6S2V7H9Bq47BrpDtZy3ftSEw/Hu2fFPbwjjc34g8P
zW/YZ8LGry01+h4TAEjGEC9oVWkYFPleZ5+hsPayknz19qwEZDcfX6KJB855ufvK
jliIVYXhSuNraRXa5+MjLe2dxyQC/Hjteve4T1iG8aLltPg7qptaVXKT2Lx3yCYK
CyrGd1raoB1DGW07Q4wpXIK9yHalCQi8WYxl86+FDtzfr4jTZ+UyZn/l8MqtHOMs
mA0v8ewvQYz/MD+FJ4RX1wpu7NpweiQActO7ABEBAAG0NE5vaWxzb24gQ2FpbyBU
ZWl4ZWlyYSBkZSBBcmF1am8gPGNhaW9nb3JlQGdtYWlsLmNvbT6JAT4EEwECACgF
AlIrMksCGwMFCQHhM4AGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEPhs49Zl
Qcdt3BgH/3iPksYhBJEJlXLGMxD/5D2o2cosORfzJMwzSsyFjx/m1XaK9PS3rpHk
kGaIClDxRdtdpPcz88a9w74uxo64e4o6sXgaUiS8GFNyIbKQbXfs4IbJfSMiFuFG
z/6tgvQ6DVw9MvAuxi0e59VZnb2pbbDgCkXKxhcQI6296ODX0AZp11mBrNC5GLuh
i1rgCKurMchnsEuylfljThI03rQgH4TeeYZqaip7RqBeTyYRcNnrXk9irc3jlb4g
cOORoDyBrrKX3tnncsGpvAmXKKIuii336YhkuQdbvgFb2035fvqCOmhiu3NYnXFA
PqEfId2LA0jSJI6pH/UVzP8BSUzUsrq5AQ0EUisySwEIAMpxB/AaTk35y5NDU3Ic
HWBT+SHR0OtMDUhbv9Gmk4lj28/1+hDzMIpPJ+pDYX5MMhEcrHFPBOD7sCA2MEoA
0z7QWsB2CICk6E4Zrik2WAXutbc/OUVNTR3UlLvzrdsX3ynzsEC8KMDehVQyH882
OGRY1OE6dZ9vau5TTcgQWvlPokyMZjDj07HYZYe9Yo+0PASUAOT282vkZh6dRC0H
fce/XfcdUxP2gkpfMw5QvOoasr3TRC7r66GhBUeGK79Gi/tTKGb8955YNkJzyfJH
ziPUWi/grm6htJnnfCHqQIMrjygU8gsFKqug7iv2cDYhKL43KfEvnz/wWji262rt
3/8AEQEAAYkBJQQYAQIADwUCUisySwIbDAUJAeEzgAAKCRD4bOPWZUHHbaD7B/9V
a6R1KkiAMs1Naeg9Ve0YBxZfQ1WSyzNTVIR9Vcl/5c1PBalniRIERrvH586BDGQe
nwjRFcZ6SEBEo2EJRlffB6n6kjD84b/zF9Grg/ubnvjKIp4lbhpAaVFJ2F6A8kV5
J9PXGWpH8P1Pyis0TDgUHRZuF/BD1o2KVhJXKY0kvD8xc8ZNPh1BGcmU2q3++Wpa
AHMk2+uFROwHGTQsLMvLiYpaiD78ZSn73RmWsr8VflYbdnY6owhkbBkYIIk7vo3T
lNTLaBBJ236hAheF8DF+RK3KiN+zpV4nxuKQ2N2QU/a7M2+0VNtHougMmKnuEMdS
MNTlJhQf0dK3EMRyaHHe
=caNZ
-----END PGP PUBLIC KEY BLOCK-----
More information about the tor-talk
mailing list