Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

Discussion in 'privacy general' started by mirimir, Sep 2, 2013.

Thread Status:
Not open for further replies.
  1. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Johnson et al (2013) Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
    -http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf
     
  2. JackmanG

    JackmanG Former Poster

    Joined:
    May 21, 2013
    Posts:
    284
    Well that's depressing.
     
  3. Carver

    Carver Registered Member

    Joined:
    Feb 5, 2006
    Posts:
    1,910
    Location:
    USA
    Will this encourage the people who run tor to change things :gack:
     
  4. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Yes, I'm sure that they're on it.
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Indeed.

    There are some good aspects, though. Based on a first read:

    • it's safest to just use ports 443 and 80
    • it's least safe to BitTorrent
    • short sessions are safer than long ones
    • changing entry guards less often is better
    I'm tempted to conclude that incorporating Tor into a nested VPN chain is at least neutral, and might even help. That's because entry connections are overall more at risk than exits, and because VPN connections through Tor typically use port 443. But I need to reread it a few times :eek:

    Also, it's important to keep in mind that VPNs would be far more susceptible to the attacks that they're modelling.
     
  6. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    I wonder if the boffins at torproject.org know about or have read this report and what they are planning to do about it, if anything?

    -- Tom
     
  7. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    When your potential adversaries have nearly global real time access to the networks you have to use, including most of the ISPs, and your software has to run on multiple operating systems, including one that was designed to spy and leak, there's only so much that you can do.
    https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
     
    Last edited: Sep 3, 2013
  8. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I saw it on tor-talk. The authors are part of the Tor research community. I'm sure that Tor developers had drafts, and they probably reviewed it. At least one of them, Paul Syverson, helped invent Tor.
     
  9. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  10. 0strodamus

    0strodamus Registered Member

    Joined:
    Aug 23, 2009
    Posts:
    1,058
    Location:
    United Surveillance States
    Today I learned what boffin means. :D
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.