[tor-dev] N reasons why the spooks love Tribler (Number N' will surprise you)

2014-12-20 Thread Yawning Angel
Hello all, Recently a decentralized onion-routing based Bittorrent client known as Tribler has made rounds through the clickbait garbage^w^wtech journalism sites. Since protocol design is a research interest of mine, I did some casual analysis based off the documentation and publicly available

Re: [tor-dev] N reasons why the spooks love Tribler (Number N' will surprise you)

2014-12-20 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Yawning Angel wrote: Hello all, Recently a decentralized onion-routing based Bittorrent client known as Tribler has made rounds through the clickbait garbage^w^wtech journalism sites. Since protocol design is a research interest of mine, I

Re: [tor-dev] N reasons why the spooks love Tribler (Number N' will surprise you)

2014-12-20 Thread Nick Mathewson
On Sat, Dec 20, 2014 at 4:56 AM, Yawning Angel yawn...@schwanenlied.me wrote: [...] * How not to do Diffie-Hellman: key = pow(dh_received, dh_secret, DIFFIE_HELLMAN_MODULUS) This is relatively minor since recovering the secret key is trivial via PRNG attacks, so the fact that the

Re: [tor-dev] N reasons why the spooks love Tribler (Number N' will surprise you)

2014-12-20 Thread Nick Mathewson
On Sat, Dec 20, 2014 at 2:09 PM, Nick Mathewson ni...@alum.mit.edu wrote: On Sat, Dec 20, 2014 at 4:56 AM, Yawning Angel yawn...@schwanenlied.me wrote: And I think that the CREATE cell handler's code's implementation of the (deprecated) TAP protocol is vulnerable to the timing attack