-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 2/8/2015 11:39 PM, George Kadianakis wrote: > Florian Rüchel <[email protected]> writes: > >> Hi everyone, >> >> I have taken some time and considered my topic for the Master's >> Thesis. I have finally decided to write it on integrating >> high-latency traffic with the Tor low-latency network (see also >> my initial mail and George's response[1]). >> > > > Hello, > > yes it does sound like an interesting research topic. > >> >> My primary research goal is to determine the impact of a mix >> network inside Tor, especially on low-latency users of the >> network. For this, I plan to use shadow [2] with scallion to >> simulate the Tor network. I then want to integrate Mix features >> into the network and see how the network reacts to certain >> attacks, attacking the mix users as well as the non-mix users. A >> crucial part in this evaluation will be to determine whether the >> anonymity of regular Tor users might be reduced (for example >> just by drawing away users from low- to high-latency traffic) or >> whether it might actually be improved (it could attract more >> users into the same network). >> > > Yes, I'm also wondering whether the anonymity of low-latency Tor > would increase if we plugged a high-latency network into it, and > also the opposite. I'm curious on whether one network will act as > cover traffic for the other, and what kind of adversaries that > would fool. > > On this topic you might also enjoy the paper "Sleeping dogs lie on > a bed of onions but wake when mixed" by Paul Syverson: > https://petsymposium.org/2011/papers/hotpets11-final10Syverson.pdf > Nice paper. Wonder why it isn't in anonbib too. I am used to keep a bookmark on anonbib as a central repository of anonymity research papers, so there's my concern :-) I will add a bibtext entry. If anyone else discovers missing papers please email me and I will add bibtext entries for them. >> However, for this evaluation/simulation to work, I need to attack >> my simulation, i.e. become the adversary and measure the >> effectiveness of my attacks. And for this, I need the actual >> implementation. So if anyone has access or can direct me to >> implementations that I can use, I would be glad for your help. >> > > What implementations do you mean? > > I'm curious to how you are going to use simulation here. I also > imagine that actually integrating mixminion with Tor on a level > that would allow simulation will be non-trivial engineering work. > > In any case, if you have specific Shadow questions, you might want > to speak with Rob Jansen who develops Shadow and who is also > interested in hidden services research. > >> It would also help me a lot if you can direct me to papers or >> articles that have shown specific attacks that are known to work >> on the current network. >> >> Finally, I am currently considering using Mixminion as my basis >> for a mix network as it seems well designed and addresses a lot >> of known attacks. I currently do not plan to evaluate its >> security but instead only the effect its usage has on attacks >> that work on regular Tor users. However, if anyone can propose a >> better mix network to base my work on, please let me know. >> > > Hm, not sure how exactly the integration will work here, but > mixminion sounds like a decent choice maybe. It's also developed by > Nick, who is the Tor developer. > > _______________________________________________ tor-dev mailing > list [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev > -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQEcBAEBCAAGBQJU19oFAAoJEIN/pSyBJlsRTa4H/22BAkmm2WE1fxiWq5xphQvM FcDVIETgJa7pdtFVh9b3gmk07Z2Mz3GyvjX5UF5rfrDEHfWebaw5S+k8M3fvKyB7 pYmX2e2vfUAX3qYyadMEn94yVWNPRRyHoLsA9iscDgOUWzmtHBKmER9yfK9tlEF9 kJP+7/IXgSR5iNoQkLO+uTO/7AaTpYyZRiYfbwBMrSz39NZSaVV0wrCuqzfyVDzL /ZvQag2C4AdMsDBdTr3Ss/dOSdcLGu0xaToo7gDMtZRHddl/RSVCY76+ASKgSknn Gjbit7BexUIYk/IHi9xwdXGHoG+tusF6rTudwQxfzuIz4zGGBH83s/OS+IyU/Xw= =3UrI -----END PGP SIGNATURE----- _______________________________________________ tor-dev mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
