Discussion in 'privacy problems' started by MrBrian, Oct 25, 2011.
From the article:
If this description is correct, it's the operating system that's exploited, not Tor itself. If this "attack" uses malware, then that malware has to be able to execute in order for the attack to succeed. Given the potentially sensitive nature of the data carried by Tor and the potential for endangering lives if that data is decrypted, the operating systems of the relays should be secured by well enforced default-deny policies.
Use TOR in locked down VM = profit
Slicing the onion: is Tor vulnerable to takeover or not?.
TOR Attack Technical Details
Is the malware required for it to work?
Other links related to the "TOR Attack Technical Details":
First Feedbacks from H2HC and our TOR Attack.
Let us stop with the buzz on TOR.
Dynamic Cryptographic Backdoors Part II Taking Control over the TOR Network (slides in PDF - not downloadable - viewable in browser).
Dynamic Cryptographic Backdoors to take over the TOR network ( YouTube video).
Note: It is important to understand that the researchers are working with the TOR Team to enhance TOR's security.
Do you have cites for that? I haven't seen anything to that effect on tor-talk. Maybe I missed it.
The cites are in the linked documents - read the documents and you will know.
It's not clear to me whether Eric Filiol's team is "working with the TOR Team to enhance TOR's security", or attempting to demonstrate that Tor is irrevocably flawed. I do see that he's being conciliatory and somewhat contrite. But I don't see any response from the Tor Project. See -https://blog.torproject.org/blog/rumors-tors-compromise-are-greatly-exaggerated for buzz.
What is clear from reading the linked documents is that Eric Filiol's team is doing research on a conceptual level that the TOR team will investigate and determine its veracity. Note: TOR is not foolproof, so I'm sure the effort will be appreciated where it can contribute to the overall effort to secure TOR by the TOR team.
It is early in the research yet, and Filiol's team have a ways to go yet before there is a significant proof-of-concept in the research they are doing for the TOR team to adopt.
Separate names with a comma.