Marc Juarez:
> I think website fingerprinting is one of the most threatening attacks to
> Tor because it can be deployed with moderate resources and the
> information that can be extracted as a result is highly sensitive (e.g.,
> browsing history). It basically defeats one of the main privacy
> guarantees offered by Tor which is unlinkability between sender and
> recipient or, in this particular case, between the user and the web
> server. However, I couldn't find any open project that tackles this
> problem in
> https://www.torproject.org/getinvolved/volunteer.html.en#Projects. That
> is why I'd like to propose a GoSC project for the implementation of
> tools (packages, classes, etc.) that contribute in the development of a
> countermeasure against this attack.

Have you read Mike Perry's long blog post on the topic?
https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks

It outlines future research work in evaluating the efficiency of
fingerprinting attacks, and also mention a couple of promising defenses.

-- 
Lunar                                             <lu...@torproject.org>

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to