Delivery-Date: Sat, 28 Jun 2014 05:26:37 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 98C8E1E094C
	for <archiver@seul.org>; Sat, 28 Jun 2014 05:26:35 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 24EC92F75A;
	Sat, 28 Jun 2014 09:26:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id AFBF52F6D1
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 09:26:14 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id sXp2uIsSh78U for <tor-talk@lists.torproject.org>;
 Sat, 28 Jun 2014 09:26:14 +0000 (UTC)
Received: from mail-oa0-x233.google.com (mail-oa0-x233.google.com
 [IPv6:2607:f8b0:4003:c02::233])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 949E82E752
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 09:26:14 +0000 (UTC)
Received: by mail-oa0-f51.google.com with SMTP id j17so6843132oag.10
 for <tor-talk@lists.torproject.org>; Sat, 28 Jun 2014 02:26:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:sender:in-reply-to:references:date:message-id:subject
 :from:to:content-type;
 bh=mgPiFs7MwTCLVD8KbPcNWF5eSvct9sozdyX8+qTuZW0=;
 b=ImDin/1Bx9U9Dvwd4XkXI9+UEW9O5nnr6WI0AAX5Hzadd0xVtapO5edPqRK4JjQ3nm
 1qfR5LTEDvKr/BY5LbCZf6FCx1741G0L2sVuIyRG2kmGi99uuufO1c6P8wr8PC+5zbvO
 vp4PC+W2Vka06j066vuSKdf3UrByr+ZAJt+wFZ6nSch6aJw38XhacRKBE2Ru8iv3iT8Z
 Hk2Ay/U8rbg0snUdR1R3lHXMPO/6VyoJ1kZB0qB/7l7cH4an1aerL5p7SU/RANKFu5ME
 uw0PIKrpLRth1NMvvPubkk2Ckmxv+bdmR8KSsOaqrbzDNJmMOE5BcsKXB/kwkrup21pa
 m0fA==
MIME-Version: 1.0
X-Received: by 10.60.43.196 with SMTP id y4mr29648726oel.44.1403947572001;
 Sat, 28 Jun 2014 02:26:12 -0700 (PDT)
Received: by 10.182.20.114 with HTTP; Sat, 28 Jun 2014 02:26:11 -0700 (PDT)
In-Reply-To: <53AE784E.9060104@riseup.net>
References: <DUB121-W32E5B8525EB5756FB0DD73C8190@phx.gbl>
 <53AB3C75.4020105@gmx.com>
 <DUB121-W401DDF2EB0B4F36357ADA2C8190@phx.gbl>
 <53AB742E.5000400@riseup.net>
 <DUB121-W1602424B2673FF14097129C8180@phx.gbl>
 <53ABAAFA.1040406@riseup.net>
 <CAJVRA1Tydi5nB544ggjZM2BvPXC=zGr_8AReO0qP_pxQ3me4UA@mail.gmail.com>
 <CAD2Ti2_F_Zbt8uL5s=hNXaNapnof2KSOPZFVgN3B-qxp5JtQqA@mail.gmail.com>
 <CAJVRA1QzUniu3cLgqLitZR7tp4TchrqD+Ak_Os0Hrm2Oe9aScw@mail.gmail.com>
 <DUB121-W20A3812716DFD202050E82C81B0@phx.gbl>
 <20140627153801.0000732c@unknown>
 <CAJVRA1Skzrmk+6HG9podxuFJCqvO5PkX_7Ofu0G0xsgHdLGc4g@mail.gmail.com>
 <CAD2Ti29kfvPbOu9f3aJ4CQGv8Z+KO81dfF7besgqLxy6nSMCwg@mail.gmail.com>
 <53AE784E.9060104@riseup.net>
Date: Sat, 28 Jun 2014 19:26:11 +1000
X-Google-Sender-Auth: b4yzvzXFg-eMSx0U6LYU9p_7K0g
Message-ID: <CAOsGNSSG8fJY-WVAPNyjpPxW8p=kLVP_ihZnBy_N1Kxb07rmJg@mail.gmail.com>
From: Zenaan Harkness <zen@freedbms.net>
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor Security and
	Anonymity
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 6/28/14, Mirimir <mirimir@riseup.net> wrote:
> On 06/28/2014 01:31 AM, grarpamp wrote:
>> On Fri, Jun 27, 2014 at 5:32 PM, coderman <coderman@gmail.com> wrote:
>>> On Fri, Jun 27, 2014 at 11:38 AM, Juan <juan.g71@gmail.com> wrote:
>>> traffic correlation is trivial if you can watch traffic in and
>>>       out of the network.
>>>> ... Tor, by design, is useless against
>>>>         governments that can do traffic analysis. For instance, the US
>>>>         government.
>>>
>>> last but not least, passive confirmation attacks are passe; the best
>>> attacks active.
>>>
>>> "From a Trickle to a Flood: Active Attacks on Several Mix Types"
>>> http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf
>>
>> Pending a second read of such papers... I still think a network
>> that uses fixed external packet sizes and fills internode links
>> with chaff versions of same to meet some fixed clock rate...
>> would be more resistant to this. Afaik no network has tried
>> this yet.
>
> What do you think of the anonymity network (Dissent) described in this
> working draft from Joan Feigenbaum and Bryan Ford?[1]
>
> [1] http://arxiv.org/abs/1312.5307

"Looks" awesome! Just finished reading it. I am not a cryptographer.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

