On Mon, Oct 18, 2010 at 2:37 PM, <[email protected]> wrote: > Maybe this subject has already been discussed here. > > Given, an attacker succeeds to break into a large number of tornodes and gets > a copy of the secret keys from all those nodes. This would increase the > chance to decrypt parts of the traffic that goes through the tor network. Am > I right? [snip]
No, Tor uses perfect forward secrecy. The session key for every node to node link is encrypted with one-time ephemeral keying. *********************************************************************** To unsubscribe, send an e-mail to [email protected] with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/

