#10969: Set of guard nodes can act as a linkability fingerprint -------------------------------------------------+------------------------- Reporter: asn | Owner: | mikeperry Type: defect | Status: | reopened Priority: High | Milestone: Tor: | unspecified Component: Core Tor/Tor | Version: Severity: Normal | Resolution: Keywords: tor-client, tor-guard, XKEYSCORE, | Actual Points: prop259, SponsorU-deferred, QUICKANT | Parent ID: | Points: large Reviewer: | Sponsor: -------------------------------------------------+-------------------------
Comment (by cypherpunks): Replying to [comment:39 isis]: > Replying to [comment:36 cypherpunks]: > > > > Btw, did anything actually change between asn commenting "switching to one entry guard slightly improved the situation, but did not fix the issue. The new guard design did not fix the issue either." and nickm closing the issue with "Prop271 and its predecessors have made progress here."? > > Yeah, there were several iterations of the new guard algorithm. [https://github.com/isislovecruft/guardsim Nick and I simulated several of the designs] [...] BTW, those simulations actually occurred a year //before// asn's astute comment, not after it. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10969#comment:47> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs