Delivery-Date: Sat, 28 Jun 2014 03:41:32 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id B6DAF1E04FE
	for <archiver@seul.org>; Sat, 28 Jun 2014 03:41:30 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 1F4E1245C7;
	Sat, 28 Jun 2014 07:41:29 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 9A0572E402
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 07:31:19 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 2UWGQH3LCCPQ for <tor-talk@lists.torproject.org>;
 Sat, 28 Jun 2014 07:31:19 +0000 (UTC)
Received: from mail-ve0-x22f.google.com (mail-ve0-x22f.google.com
 [IPv6:2607:f8b0:400c:c01::22f])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 75BDD2E2CC
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 07:31:19 +0000 (UTC)
Received: by mail-ve0-f175.google.com with SMTP id jx11so6326115veb.6
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 00:31:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type; bh=kioPy8KKepIeTb3t5hqRtLipQ4AOWNXqStaFyYgrZv0=;
 b=B12AISzdorh2A96gm49MOvgJC/dPXONIXpAQY8jcibXsr6D++oTpbS7gc+g2qhL2lD
 N4y0rZf2MsCJdU1LFsXZ9te+QBPKJ7JRUxUO2noJ8dAxrssnmEFyFQjiR8kis/mevzmJ
 wHeJujsGB6IkkwzsWiBBKYN8GI5ziKehm9Gz4oDffErFBt8FJd6DX89R1zjsPX2BVtUI
 +Bgda/ELaLSE/cgFceWznmyH6NiRTFcJs0xL/wDcv7qamBDOsIVjRvpijZ2/TsYzF6Hv
 NaOoi/e2h9WuM9IWoTyRKZiOmPu/wEgwQ7mtm9Fy7mOlwqKvWROJui+IsfxZB8ACif0p
 zMFQ==
MIME-Version: 1.0
X-Received: by 10.58.116.4 with SMTP id js4mr1515022veb.38.1403940676931; Sat,
 28 Jun 2014 00:31:16 -0700 (PDT)
Received: by 10.221.65.198 with HTTP; Sat, 28 Jun 2014 00:31:16 -0700 (PDT)
In-Reply-To: <CAJVRA1Skzrmk+6HG9podxuFJCqvO5PkX_7Ofu0G0xsgHdLGc4g@mail.gmail.com>
References: <DUB121-W32E5B8525EB5756FB0DD73C8190@phx.gbl>
 <53AB3C75.4020105@gmx.com>
 <DUB121-W401DDF2EB0B4F36357ADA2C8190@phx.gbl>
 <53AB742E.5000400@riseup.net>
 <DUB121-W1602424B2673FF14097129C8180@phx.gbl>
 <53ABAAFA.1040406@riseup.net>
 <CAJVRA1Tydi5nB544ggjZM2BvPXC=zGr_8AReO0qP_pxQ3me4UA@mail.gmail.com>
 <CAD2Ti2_F_Zbt8uL5s=hNXaNapnof2KSOPZFVgN3B-qxp5JtQqA@mail.gmail.com>
 <CAJVRA1QzUniu3cLgqLitZR7tp4TchrqD+Ak_Os0Hrm2Oe9aScw@mail.gmail.com>
 <DUB121-W20A3812716DFD202050E82C81B0@phx.gbl>
 <20140627153801.0000732c@unknown>
 <CAJVRA1Skzrmk+6HG9podxuFJCqvO5PkX_7Ofu0G0xsgHdLGc4g@mail.gmail.com>
Date: Sat, 28 Jun 2014 03:31:16 -0400
Message-ID: <CAD2Ti29kfvPbOu9f3aJ4CQGv8Z+KO81dfF7besgqLxy6nSMCwg@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor Security and
	Anonymity
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Fri, Jun 27, 2014 at 5:32 PM, coderman <coderman@gmail.com> wrote:
> On Fri, Jun 27, 2014 at 11:38 AM, Juan <juan.g71@gmail.com> wrote:
> traffic correlation is trivial if you can watch traffic in and
>       out of the network.
>> ... Tor, by design, is useless against
>>         governments that can do traffic analysis. For instance, the US
>>         government.
>
> last but not least, passive confirmation attacks are passe; the best
> attacks active.
>
> "From a Trickle to a Flood: Active Attacks on Several Mix Types"
> http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf

Pending a second read of such papers... I still think a network
that uses fixed external packet sizes and fills internode links
with chaff versions of same to meet some fixed clock rate...
would be more resistant to this. Afaik no network has tried
this yet.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

