Mike Perry:
> Roger Dingledine:
>
> http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
>
> > But actually, this Oakland paper you're looking at is a mash-up of two
> > paper ideas. The first explores how to become an HSDir for a hidden
> > service (so you can learn its address and measur
Tom Ritter:
> On 28 May 2013 16:33, Mike Perry wrote:
> > Additionally, as far as I can see, if you can control the introduction
> > points using the attack from the first part of the paper, you could also
> > perform this attack against a *user* as well (which is the threat model
> > strongbox r
On 28 May 2013 16:33, Mike Perry wrote:
> Additionally, as far as I can see, if you can control the introduction
> points using the attack from the first part of the paper, you could also
> perform this attack against a *user* as well (which is the threat model
> strongbox really tries to address)
Roger Dingledine:
> On Mon, May 27, 2013 at 11:39:06AM -0700, Micah Lee wrote:
> > Would it be fair to say that using the techniques published in this
> > paper an attacker can deanonymize a hidden service?
>
> Yes, if you're willing to sustain the attack for months.
>
> But actually, this Oakla
On Mon, May 27, 2013 at 11:39:06AM -0700, Micah Lee wrote:
> Would it be fair to say that using the techniques published in this
> paper an attacker can deanonymize a hidden service?
Yes, if you're willing to sustain the attack for months.
But actually, this Oakland paper you're looking at is a m
On 05/23/2013 07:18 PM, Tom Ritter wrote:
> RPW's, et al's paper was made public today, and demonstrates several
> practical attacks on Hidden Services.
> http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
>
> I was wondering if there were any private trac tickets, discussions,
> or develo
>> RPW's, et al's paper was made public today, and demonstrates several
>> practical attacks on Hidden Services.
>> http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
"pg 80: Until now there have been no statistics about the number of
hidden services..."
There are some... at least one cur
On Thu, May 23, 2013 at 10:18 PM, Tom Ritter wrote:
> RPW's, et al's paper was made public today, and demonstrates several
> practical attacks on Hidden Services.
> http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
>
> I was wondering if there were any private trac tickets, discussions,
>
Tom Ritter:
> RPW's, et al's paper was made public today, and demonstrates several
> practical attacks on Hidden Services.
> http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
Sweet. I was waiting for a public version of this to appear. It was
shared with a few Tor people, but as I don't
RPW's, et al's paper was made public today, and demonstrates several
practical attacks on Hidden Services.
http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
I was wondering if there were any private trac tickets, discussions,
or development plans about this that might be also be made publ
10 matches
Mail list logo