From Newsgroup: sci.crypt
Nomen Nescio wrote:
Gabx<virebent@tcpreset.invalid> wrote:
[ A lot of nonsense snipped ]
Ah, I see, you trimmed the nonsense just to make room for your own.
**Generous**!!!
Multiple academic papers demonstrate circuit length fingerprinting through timing analysis:
-
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf
-
https://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf
You CANNOT directly extract hop counts from encrypted packets, but
behavioral fingerprinting during construction is well-documented and
highly effective.
- You're still hitting more potentially compromised nodes
Desn't matter as an adversary has to own all relays of a circuit to compromize the user, which becomes harder with every additional hop.
An adversary controlling just the entry and exit (or even entry and one middle) can perform correlation attacks:
-
https://blog.torproject.org/one-cell-enough-break-tors-anonymity/
-
https://www-users.cse.umn.edu/~hoppernj/deepcoffea.pdf
The "need all relays" assumption hasn't been valid since ~2004.
Modern attacks work with partial path knowledge.
- Resource exhaustion on the network still happens
Doesn't matter as we transfer only a small amount of remailer data
compared with those who for example stream sensitive video contents.
It's not about total bandwidth, it's about computational overhead per hop.
Each additional hop multiplies,encrypt/decrypt at every relay,memory usage, circuit construction overhead.
A 7-hop remailer message uses ~3x more relay CPU cycles and memory than
a 3-hop video stream, despite transferring less data.
The crypto overhead scales with path length, not payload size.
I don't know with pornohub lol
The "small data volume" argument ignores that Tor's bottleneck is relay processing capacity, not raw bandwidth.
Even 1% of users adopting 7+ hop circuits would significantly impact network performance.
-
https://www.researchgate.net/publication/285449449_The_Path_Less_Travelled_Overcoming_Tor's_Bottlenecks_with_Traffic_Splitting
-
https://forum.torproject.org/t/when-will-tor-fully-exploit-all-cpu-threads/2198
- Implementation bugs still exist
Only a problem when amateurs like you get active.
I'm never been passive mon cher !!! <3
- Timing attacks are still viable
For timing attacks you have to correlate traffic at a potential target
with that at the server he uses. More latency with more variation as provided by longer circuits makes that task much more difficult. And in
case an attacker nevertheless succeeds the then obvious knowledge of a latency longer than usual as an indicator of an exceptionally long chain implies no additional value.
This demonstrates a fundamental misunderstanding of modern timing attacks. Again, read this i said:
-
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-kwon.pdf
- Sybil attackers still get more opportunities
That's exactly the Tor problem which can be addressed by using LONGER circuits, which is why we refuse the standard 3-hop routing.
This completely inverts the mathematical reality of Sybil attacks. Longer circuits make Sybil attacks MORE effective, not less
-
https://www.researchgate.net/publication/229003986_On_the_Optimal_Path_Length_for_Tor
Thanks for your attention.
You should thank me.
For writing this answer it took me two days as if I already had nothing to do. It's free of charge !!!
Gabx
--- Digital Signature --- /dZkdkFUmBijUqxh3q0rHesqp5+QjKGQqI7C0Cmrsy8NDZGsix2PRIjDuN6ZNLeY0IsJ/sq6vfPLLLlj/UZhAg==
--- Synchronet 3.21a-Linux NewsLink 1.2