TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tor security advisory: “relay early” traffic confirmation attack

197 pointsby ohmygodelalmost 11 years ago

6 comments

scottalpertalmost 11 years ago
First rule of security: There is no perfect security. You need a multilayered strategy. Tor is a start. Anonymized OSs like Tails are another aspect. Not releasing personal info on the web -- to the extent you can do that -- is another.
评论 #8109361 未加载
Udoalmost 11 years ago
Is this problem even solvable on a fundamental level?<p>Of course, they can work on preventing nodes forwarding hidden header information, but an entity with global network insight will always be able to correlate users by the timing of their transmissions alone.<p>The introduction of malicious nodes is a workable option for lesser players. But hidden in the realtime nature of the Tor network is always the possibility of deanonymizing users if you&#x27;re a powerful agency that can afford to inspect a sufficiently large part of all network traffic - they don&#x27;t even have to run any nodes themselves.
评论 #8109470 未加载
评论 #8109015 未加载
评论 #8109836 未加载
评论 #8110104 未加载
评论 #8109206 未加载
mike-cardwellalmost 11 years ago
&quot;So if the attack was a research project (i.e. not intentionally malicious), it was deployed in an irresponsible way because it puts users at risk indefinitely into the future.&quot;
higherpurposealmost 11 years ago
I&#x27;m disappointed nobody has &quot;leaked&quot; the research so far. If they cared enough to research it in academia, surely they know it&#x27;s important enough for Tor developers to know about the type of attacks they were performing, despite what any government officials might say? At least some hints should be leaked, if not the whole research.
评论 #8108154 未加载
评论 #8107628 未加载
评论 #8107974 未加载
opendaisalmost 11 years ago
It sounds like to be truly safe you need to know safe entry guard node(s) and&#x2F;or operate your own group of entry relays. Otherwise, you risk X% of your traffic potentially being deanonymized by someone controlling both ends.<p>Of course, if you do that, you probably need to remain constantly connected and moving data through Tor 24&#x2F;7 to prevent any kind of analysis since you can&#x27;t hide the fact you:<p>A) Control the relay you connect to.<p>B) Are connected to Tor.
评论 #8108547 未加载
评论 #8109321 未加载
infinity0almost 11 years ago
Please will a mod rename the title? The blog post explicitly says (at the bottom) that we don&#x27;t know if this is the Black Hat talk that got cancelled early.
评论 #8109743 未加载
评论 #8107635 未加载