Hello all,
Recently a decentralized onion-routing based Bittorrent client known as
Tribler has made rounds through the clickbait garbage^w^wtech
journalism sites. Since protocol design is a research interest of
mine, I did some casual analysis based off the documentation and
publicly available
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Yawning Angel wrote:
Hello all,
Recently a decentralized onion-routing based Bittorrent client
known as Tribler has made rounds through the clickbait
garbage^w^wtech journalism sites. Since protocol design is a
research interest of mine, I
Hi!
So, Rob came up with this clever way to use help from an OS kernel to
improve Tor's performance:
http://www.robgjansen.com/publications/kist-sec2014.pdf
I've got a sketchy implementation together now.
See my comments on the end of ticket 12890. I have a branch which I
believe implements
On Sat, Dec 20, 2014 at 4:56 AM, Yawning Angel yawn...@schwanenlied.me wrote:
[...]
* How not to do Diffie-Hellman:
key = pow(dh_received, dh_secret, DIFFIE_HELLMAN_MODULUS)
This is relatively minor since recovering the secret key is trivial
via PRNG attacks, so the fact that the
On Sat, Dec 20, 2014 at 2:09 PM, Nick Mathewson ni...@alum.mit.edu wrote:
On Sat, Dec 20, 2014 at 4:56 AM, Yawning Angel yawn...@schwanenlied.me
wrote:
And I think that the CREATE cell handler's code's implementation of
the (deprecated) TAP protocol is vulnerable to the timing attack
Thanks for getting this started, Nick! I’ve added some comments and changes to
the trac ticket #12890.
All the best,
Rob
On Dec 20, 2014, at 12:51 PM, Nick Mathewson ni...@torproject.org wrote:
Hi!
So, Rob came up with this clever way to use help from an OS kernel to
improve Tor's