-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Mike Perry wrote: > The Tor settings are by far the more impactful of the two, I've found. doesn't changing the CircuitBuildTimeout and the NumEntryGuards give an advantage to an attacker which is spying on your connections? IIRC it should be mentioned in the design documents: an attacker which is reading traffic can isolate clusters of users depending on their tor client behavior and then launching other types of attack on them with higher percentage of success due to the previous clustering.
ciao - -- Marco Bonetti BT3 EeePC 70x enhancing module: http://sid77.slackware.it/bt3/ Slackintosh Linux Project Developer: http://workaround.ch/ Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/ My webstuff: http://sidbox.homelinux.org/ My GnuPG key id: 0x86A91047 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFI/4MxyPKw+YapEEcRAvWNAJ95GxhLZqEt1HZn24Ku06y1+KqdwwCgiXbx tt16CLUis+754f4uNkcvOi0= =tRnr -----END PGP SIGNATURE-----