On Wed, Jan 15, 2014 at 7:16 PM, Jim Rucker <mrjim...@gmail.com> wrote:
> [snip]
>
> From my understanding (please correct me if I'm wrong) Tor has a weakness in
> that if someone can monitor data going into the relays and going out of the
> exit nodes then they can defeat the anonymity of tor by correlating the size
> and number of packets being sent to relays and comparing those that the
> packets leaving the exit nodes.
>
> Are there any projects in Tor being worked in to combat data correlation?
> For instance, relays the send/recv constant data rates continuously -
> capping data rates and padding partial or non-packets with random data to
> maintain the data rates

What you are referring to is a traffic confirmation attack. It's a
deceptively hard problem --- even if the naive strategy of sending
data at a constant rate "worked" (for some definition) it would be
prohibitively expense in practice. It is also worth reiterating that
even if such a countermeasure is in place, it wouldn't conceal that
fact that a specific user is connecting to the Tor network.

If you are interested in recent academic works on traffic analysis,
you should have a look at [1] and [2]. They explore the related
setting of website fingerprinting attacks and defenses (including the
one you suggest.)

-Kevin

[1] https://kpdyer.com/publications/oakland2012-peekaboo.pdf
[2] http://cacr.uwaterloo.ca/techreports/2013/cacr2013-30.pdf
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to