[tor-talk] Question for those who say "Tor is pwned"
juan
juan.g71 at gmail.com
Tue Jun 21 00:20:54 UTC 2016
On Mon, 20 Jun 2016 18:52:17 -0500
Anthony Papillion <anthony at cajuntechie.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> On 6/20/2016 6:39 PM, juan wrote:
> >
> > by-the-way
> >
> > http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf
> >
> > Users Get Routed: Traffic Correlation on Tor by Realistic
> > Adversaries
> >
> > "Tor is known to be insecure against an adversary that can observe
> > a user’s traffic entering and exiting the anonymity network."
> >
> > "Our analysis shows that 80% of all types of users may be de-
> > anonymized by a relatively moderate Tor-relay adversary within six
> > months. Our results also show that against a single AS adversary
> > roughly 100% of users in some common locations are deanonymized
> > within three months (95% in three months for a single IXP).
> > Further, we find that an adversary controlling two ASes instead of
> > one reduces the median time to the first client de-anonymization by
> > an order of magnitude: from over three months to only 1 day for a
> > typ- ical web user; and from over three months to roughly one month
> > for a BitTorrent user.
>
>
> So basically you're saying that Tor is actually pretty darn secure if
> you don't use it every single time you connect to the Internet or for
> extended periods of time?
Well, if you want to completely misunderstand the statement,
you are free to do so. And I'm not saying it, I'm quoting
somebody else. I suggest you bother to find out who the
authors of the 'paper' are.
But, anyway, let me point out that while casual users may be
'darn secure', the 'hidden' servers inside the .onion space
are obviously not.
>
> Anthony
>
> -----BEGIN PGP SIGNATURE-----
>
> iQIcBAEBCgAGBQJXaIGwAAoJEAKK33RTsEsVmiUP/1Ck+V9yo2GNxjLe6eWmyCH9
> xtg0NHYik5i/0rRhHonTAHFZSpZxZIgWfsDaJscExzFbdTIzNJgxIHki+PhOMYm1
> h7PUO+bjFfbmQgFRgSEJ+QQImoNP9nuZiNLGNg3APMkftfCkSGgd3bCV2YD3x5o7
> 8rwPDyHHOQpyVgqyLPcHlduaeFAD0xoxhCEgZoMg1uiD7ycBGdnGOQyZOFe+OOaJ
> rP2E1YOnniPUhk1aK8h3ZSf5tjSyEi2owfXPt5wnKdlUeBYvGqi4Y3sSn4YFtHGG
> ecbmxlZ/QZeG3dAirxEZ5O0U1ndaUkTvkMScqdBO28r6vXS9s3k6lCR/Ux59TIQB
> auk3u2gQ+c7Hrfgk4kuLE4++9V7CvkGReAV/0DJcrJluaxzkp3kbqrpiNyZe1m9y
> 3ZU+9l0ksmbcfV1J/jU3MGQ7T/f1oCm4wPn7zMTBPPWGHSKESbH0EZxSm7F/1A1I
> J4VRziVCnN6WjFLtv7Y/TN6fJm1NtEbtLXYhkHH4dWX55lddJrhT8niqsz+4uRaQ
> O2WYgUdkVWC/bMxmEzJbTyu7FpbjdZ1DcqqvCI/ydAKMpPT6ITbOQSbbhhXAcT5g
> dXLkg+4nkN3t4G7kMOihaY7QKUUdjvkTyGe5UTfcdO7SqfR4PhznLXbY2u0oZhtJ
> xs+7Y5gE8iSmJNShi0sG
> =HA9W
> -----END PGP SIGNATURE-----
More information about the tor-talk
mailing list