Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 26 |
Nodes: | 6 (0 / 6) |
Uptime: | 55:59:24 |
Calls: | 632 |
Files: | 1,187 |
D/L today: |
27 files (19,977K bytes) |
Messages: | 179,536 |
Now, to be fair, extended circuits DO become somewhat more tolerable for >non-real-time protocols like:
- Email (SMTP/IMAP sessions)
- Usenet posting/reading (NNTP)
- File transfers (when you can wait)
- Async messaging protocols
The performance hit is still there, but users can tolerate 30-second delays >for sending an email vs. 30-second delays loading every webpage.
**HOWEVER** - and this is crucial - improved performance tolerance doesn't >magically fix any of the other serious security issues:
- You're still fingerprinting yourself as using modified Tor
- Circuit failure rates are still 3-8x higher
- You're still hitting more potentially compromised nodes
- Resource exhaustion on the network still happens
- Implementation bugs still exist
- Timing attacks are still viable
- Sybil attackers still get more opportunities
Don't let "it's usable for email" fool you into thinking extended circuits >are suddenly safe.
The performance problem is just ONE of many serious
issues.
Gabx<virebent@tcpreset.invalid> wrote:
[ A lot of nonsense snipped ]
An adversary controlling just the entry and exit (or even entry and one middle) can perform correlation attacks:- You're still hitting more potentially compromised nodesDesn't matter as an adversary has to own all relays of a circuit to compromize the user, which becomes harder with every additional hop.
- Resource exhaustion on the network still happensDoesn't matter as we transfer only a small amount of remailer data
compared with those who for example stream sensitive video contents.
I'm never been passive mon cher !!! <3- Implementation bugs still existOnly a problem when amateurs like you get active.
This demonstrates a fundamental misunderstanding of modern timing attacks. Again, read this i said:- Timing attacks are still viableFor timing attacks you have to correlate traffic at a potential target
with that at the server he uses. More latency with more variation as provided by longer circuits makes that task much more difficult. And in
case an attacker nevertheless succeeds the then obvious knowledge of a latency longer than usual as an indicator of an exceptionally long chain implies no additional value.
- Sybil attackers still get more opportunitiesThat's exactly the Tor problem which can be addressed by using LONGER circuits, which is why we refuse the standard 3-hop routing.
Thanks for your attention.