On Mon, Oct 18, 2010 at 2:37 PM,  <[email protected]> wrote:
> Maybe this subject has already been discussed here.
>
> Given, an attacker succeeds to break into a large number of tornodes and gets 
> a copy of the secret keys from all those nodes. This would increase the 
> chance to decrypt parts of the traffic that goes through the tor network. Am 
> I right?
[snip]

No, Tor uses perfect forward secrecy. The session key for every node
to node link is encrypted with one-time ephemeral keying.
***********************************************************************
To unsubscribe, send an e-mail to [email protected] with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

Reply via email to