On Thu, Oct 30, 2014 at 03:48:27PM +0100, Lars Luthman wrote: > > If so, has anyone ever thought about the pros/cons of this? Obviously, it's > > exponentially more inefficient. But is it any more secure? > > I have done it accidentally with a misconfigured transparent proxy that > sent its own Tor traffic to its own transparent proxying port. It > worked, though a bit slower (as expected). > > I don't think it would be any more secure. The most serious publically > known attacks against the anonymity of Tor users (browser bugs etc > notwithstanding) are correlation attacks where the attacker compare > traffic at the client end with traffic at exit nodes and see if it looks > similar in timing and data sizes. A six-relay circuit (which is what you > get when running Tor over Tor) doesn't change that at all. > > An attack where the traffic is actually traced all the way through the > Tor relays would be harder, but those are probably not the attacks we > should be worrying about in the first place. And a longer circuit may > circuit as well.
Right. Also have a read through https://trac.torproject.org/projects/tor/ticket/2667 for how we'd like to disable Tor-over-Tor one day to block an attack (but there are tradeoffs). --Roger -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
