Likely because other non-Tor-specific attacks (staining, pwning) that are 
mentioned, are way easier.

They are probably working on it, though. Data centre in Utah, anyone?

On 05/10/13 07:20, Jack Singleton wrote:
> Interesting that there is no mention of timing attacks...
> 
> You would think with the amount of monitoring they are doing that it would
> be fairly simple to correlate traffic being sent to tor nodes with traffic
> leaving exit nodes.
> 
> 
> On Fri, Oct 4, 2013 at 1:34 PM, Ian Clarke <i...@freenetproject.org> wrote:
> 
>> This is very interesting:
>>
>>
>> http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
>>
>> Looks like it's not an attack on Tor itself, rather they identify Tor users
>> (which Tor isn't designed to prevent AFAIK), and then do a MITM on the
>> connection between Tor and the web to insert some code that exploits a
>> vulnerability that (until recently) was distributed as part of the Tor
>> bundle.
>>
>> Seem like, even though this Firefox vulnerability has been fixed, that they
>> probably have a library of other ones to choose from.
>>
>> Ian.
>>
>> --
>> Ian Clarke
>> Founder, The Freenet Project
>> Email: i...@freenetproject.org
>> _______________________________________________
>> Devl mailing list
>> Devl@freenetproject.org
>> https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
>>
> _______________________________________________
> Devl mailing list
> Devl@freenetproject.org
> https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
> 


-- 
GPG: 4096R/1318EFAC5FBBDBCE
git://github.com/infinity0/pubkeys.git
_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to