|
Full Disclosure
mailing list archives
Re: tor vulnerabilities?
From: Georgi Guninski <guninski () guninski com>
Date: Tue, 1 Oct 2013 17:55:12 +0300
On Wed, Jul 03, 2013 at 01:07:35PM -0400, Valdis.Kletnieks () vt edu wrote:
On Wed, 03 Jul 2013 17:34:52 +0300, Georgi Guninski said:
Or maybe some obscure feature deanonymize in O(1) :)
IT's open source. You're allegedly a security expert. Start auditing
the code and let us know what you find. :)
(And hey - it would be worth it. The guy who finds an O(1) hole
in Tor is going to pick up some serious street cred.)
Valdis,
I knew time for trolling would come soon.
FYI attacks on tor are becoming public:
http://www.theregister.co.uk/2013/09/01/tor_correlation_follows_the_breadcrumbs_back_to_the_users/
“An adversary that provides no more bandwidth than some volunteers do today can deanonymize any given user within three
months of regular Tor use with over 50 percent probability and within six months with over 80 percent probability."
I continue to suspect O(1) deanonymization is possible.
Your street cred social trick didn't work, sorry :)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: tor vulnerabilities? Georgi Guninski (Oct 01)
|