On 2018-03-26 20:34, Mike Perry wrote:
Florentin Rochet:
On 2018-03-20 04:57, Mike Perry wrote:
Arguments for staying with just one guard:
1. One guard means less observability.
As Roger put it in the above blog post: "I think the analysis of the
network-level adversary in Aaron's paper is
Mike Perry writes:
> [ text/plain ]
> Back in 2014, Tor moved from three guard nodes to one guard node:
> https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters
> https://trac.torproject.org/projects/tor/ticket/12206
>
> We made this change
Florentin Rochet:
> On 2018-03-20 04:57, Mike Perry wrote:
> >
> >Arguments for staying with just one guard:
> >
> >1. One guard means less observability.
> >
> >As Roger put it in the above blog post: "I think the analysis of the
> >network-level adversary in Aaron's paper is the strongest
Mike Perry:
> David Goulet:
> > On 22 Mar (13:46:36), George Kadianakis wrote:
> > > Mike Perry writes:
> > >
> > > > Arguments in favor of switching to two entry guards:
> > > >
> > > > 1. One guard allows course-grained netflow confirmation attacks
> > > >
> > > > The
On 22 Mar (17:13:40), Mike Perry wrote:
> David Goulet:
> > On 22 Mar (13:46:36), George Kadianakis wrote:
> > > Mike Perry writes:
> > >
> > > > Arguments in favor of switching to two entry guards:
> > > >
> > > > 1. One guard allows course-grained netflow confirmation
On Thu, Mar 22, 2018 at 1:13 PM, Mike Perry wrote:
> I strongly disagree. Dumping more traffic onto an already existing,
> otherwise in-use connection is not the same as the ability to force a
> new connection that is only used for a single request at a very specific
>
George Kadianakis:
> David Goulet writes:
> > On 22 Mar (13:46:36), George Kadianakis wrote:
> >> Mike Perry writes:
> >> > Roger suggested that I enumerate the pros and cons of this increase on
> >> > this mailing list, so we can discuss and
David Goulet:
> On 22 Mar (13:46:36), George Kadianakis wrote:
> > Mike Perry writes:
> >
> > > Arguments in favor of switching to two entry guards:
> > >
> > > 1. One guard allows course-grained netflow confirmation attacks
> > >
> > > The counterargument based on
David Goulet writes:
> [ text/plain ]
> On 22 Mar (13:46:36), George Kadianakis wrote:
>> Mike Perry writes:
>>
>> > [ text/plain ]
>> > Back in 2014, Tor moved from three guard nodes to one guard node:
>> >
On 22 Mar (13:46:36), George Kadianakis wrote:
> Mike Perry writes:
>
> > [ text/plain ]
> > Back in 2014, Tor moved from three guard nodes to one guard node:
> > https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters
> >
Mike Perry writes:
> [ text/plain ]
> Back in 2014, Tor moved from three guard nodes to one guard node:
> https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters
> https://trac.torproject.org/projects/tor/ticket/12206
>
> We made this change
Hello,
Thank you for this great summary :)
On 2018-03-20 04:57, Mike Perry wrote:
Arguments for staying with just one guard:
1. One guard means less observability.
As Roger put it in the above blog post: "I think the analysis of the
network-level adversary in Aaron's paper is the strongest
Mike Perry:
> 2. Guard fingerprintability is lower with one guard
> An adversary who is watching netflow connection records for an entire
> area is able to track users as they move from internet connection to
> internet connection through the degree of uniqueness of their guard
> choice. There is
13 matches
Mail list logo