Matthew Toseland wrote:
>> What happens if the darknet nodes don't form a connected subnetwork?
> 
> Presumably it will only work in darknet subnetworks.

So the cell is limited by the size of the darknet subnetwork? Makes
sense, but if a darknet subnetwork generally corresponds to a group or
organisation then remaining anonymous within that group might not as
useful as remaining anonymous within a group of strangers.

> But it's fairly unlikely that two tunnels from Y both reached X, isn't it?

Right, but the point I was trying to make (which really isn't very
important) is that for the purposes of determining whether X is the
initiator, it's irrelevant whether the attacker sees two tunnels exiting
X by different paths or two tunnels exiting X by the same path. I'm not
trying to say that two tunnels exiting X don't tell the attacker
anything - they do. But it's irrelevant where the tunnels go after
exiting X, because the routes are random.

Cheers,
Michael

Reply via email to