Delivery-Date: Fri, 28 Nov 2014 19:08:59 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id F37C51E0E8D;
	Fri, 28 Nov 2014 19:08:57 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4C37331D80;
	Sat, 29 Nov 2014 00:08:51 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 5C86131C1E
 for <tor-talk@lists.torproject.org>; Sat, 29 Nov 2014 00:08:47 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id eNjB_M1FqTGK for <tor-talk@lists.torproject.org>;
 Sat, 29 Nov 2014 00:08:47 +0000 (UTC)
Received: from mail-ig0-x235.google.com (mail-ig0-x235.google.com
 [IPv6:2607:f8b0:4001:c05::235])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 3B3E131A4D
 for <tor-talk@lists.torproject.org>; Sat, 29 Nov 2014 00:08:47 +0000 (UTC)
Received: by mail-ig0-f181.google.com with SMTP id l13so6800167iga.2
 for <tor-talk@lists.torproject.org>; Fri, 28 Nov 2014 16:08:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=date:from:to:subject:message-id:mime-version:content-type
 :content-transfer-encoding;
 bh=CSqju+1/E5UJihnsgjiMMIKai4MUtjcW8f+kGkryjI0=;
 b=hBEZhZV15FyD8RASJvGYX4QhLrkAl+Q5adhR3aC+j6ll34/jVVMdNqNQOGGd2YZ1lv
 0l+8nijLZ/T8kUv1ZJpwHw+nsMoBoy6Y5T89OAQBM5NfGvaBh++/Mp4KMx8vbCUwe4oQ
 JTTc2m2fcTXbhW9HV7SgwJh932ETVIuBc0fwhvDTuTWI3Pk4N0dLF8dko09UErrreYrP
 t1LIh6uUomO7Rl4g9hy9VrzlFEgg3TJUQfaCsGWBpCK+06JOkr3G5Oo7ijyVZQA7t0bg
 bGh0JspxFTWMlrRIpNslsA8ABUqboi3CbxMDqiBaYh3MxZpcCydGDY2peKvhPvr4sXu+
 pj2w==
X-Received: by 10.50.79.135 with SMTP id j7mr35624265igx.14.1417219724961;
 Fri, 28 Nov 2014 16:08:44 -0800 (PST)
Received: from aspire ([199.127.109.117])
 by mx.google.com with ESMTPSA id k140sm5683043ioe.39.2014.11.28.16.08.44
 for <tor-talk@lists.torproject.org>
 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
 Fri, 28 Nov 2014 16:08:44 -0800 (PST)
Date: Fri, 28 Nov 2014 19:06:29 -0500
From: Mansour Moufid <mansourmoufid@gmail.com>
To: tor-talk@lists.torproject.org
Message-Id: <20141128190629.2d44aa081148777632b5bea7@gmail.com>
X-Mailer: Sylpheed 3.2.0 (GTK+ 2.24.10; x86_64-pc-linux-gnu)
Mime-Version: 1.0
Subject: [tor-talk] latest generation traffic confirmation attacks
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

In case you missed it:

"On Effectiveness of Hopping-Based Spread Spectrum Techniques for
Network Forensic Traceback"

http://dx.doi.org/10.2991/ijndc.2013.1.3.3

They implemented new traffic confirmation attacks that cannot be
detected by the end points, based on some radar techniques.  They
don't mention it but the attacks can be implemented in real time.

They can also decrease the false positive rate by increasing the
bandwidth of the DSSS chip.  A patient enough attacker can have no
false positives.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

