Re: Anonymity easily thwarted by flooding network with relays?

2010-11-20 Thread John Case
On Fri, 19 Nov 2010, Theodore Bagwell wrote: On Fri, 19 Nov 2010 08:11 -0500, Paul Syverson syver...@itd.nrl.navy.mil wrote: Your reactions are good. It's just that many people have had the same reactions so we've explored this, and nobody in all of the research done has yet produced a viable

Re: Anonymity easily thwarted by flooding network with relays?

2010-11-19 Thread Michael Cozzi
On 11/18/2010 11:03 PM, Roger Dingledine wrote: attack, which doesn't care how many hops your path has (as long as it's at least two). You can read more about it from the various freehaven.net/anonbib/ links in this blog post about a related topic:

Re: Anonymity easily thwarted by flooding network with relays?

2010-11-19 Thread Paul Syverson
On Fri, Nov 19, 2010 at 10:49:32AM -0500, Jonathan D. Proulx wrote: On Fri, Nov 19, 2010 at 10:33:38AM -0500, Paul Syverson wrote: :Better go have another espresso ;) further through the coffee now and wishing if I had to have said thout out loud I'd at least not sent from my MIT addresss

Re: Anonymity easily thwarted by flooding network with relays?

2010-11-18 Thread Roger Dingledine
On Thu, Nov 18, 2010 at 06:19:03PM -0800, Theodore Bagwell wrote: Some of you may be aware of the paper,Cyber Crime Scene Investigations (C2SI) through Cloud Computing (http://www.cs.uml.edu/~xinwenfu/paper/SPCC10_Fu.pdf) which illustrates a feasible method of invalidating the anonymity

Re: Anonymity easily thwarted by flooding network with relays?

2010-11-18 Thread zzzjethro666
-Original Message- From: Theodore Bagwell torus...@imap.cc To: or-t...@seul.org Sent: Fri, Nov 19, 2010 9:19 am Subject: Anonymity easily thwarted by flooding network with relays? Some of you may be aware of the paper,Cyber Crime Scene Investigations C2SI) through Cloud Computing