It's very interesting and from what I can deduce, right. However, this isn't new news. What *is* new is that it has been proved using math and logic. I know that tor will eventually rise to defend this attack as other applications such as freenet (i2p also?) have. Another implication to consider of this is what if the same ISP controlled the entry and exit nodes? Ringo
On 2/25/07, James Muir <[EMAIL PROTECTED]> wrote:
No one seems to have posted this to the list yet, so I thought I should: "Low-Resource Routing Attacks Against Anonymous Systems", K. Bauer, D. McCoy, D. Grunwald, T. Kohno, D. Sicker Technical Report, University of Colorado http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf It was posted on Slashdot: http://yro.slashdot.org/yro/07/02/25/1913219.shtml -James

