On Sun, Jun 29, 2014 at 2:24 PM, Juan <juan....@gmail.com> wrote:
> ...
>         You´ve been officially threatened by one of the ´leaders´ of the
>         ´tor family´ for (unlike me) politely point out tor´s obvious
>         flaws.


"pointing out obvious flaws" - as in, "it's so easy to protect against
traffic analysis!  just make one end invisible!"

?

...

in the interest of adding even a minuscule bit of signal back to this
discussion, let's get technical.

1) compute the cost of global traffic analysis.  we have big data mark
to put a ball park on it, but the point is: the cost is non zero and
non trivial.

2) compare to other mechanisms of compromise, whether through remote
exploitation, technical surveillance, surreptitious physical access,
etc.

3) compare to possible *well researched/designed* solutions against
traffic analysis.



the math appears to be #1 is expensive on already maximized
intelligence community budgets.  possible?  of course.  actually
applied?  not so clear.[0]

re #2, it is cheaper in every sense, to pwn the application layer and
end point directly. this is well documented by years of industry
experience, and more recently through covert budget details leaked.


finally, #3: this is fucking hard! to point a fine point on it.  if
you've designed and implemented a low latency traffic analysis
resistant anonymity protocol with great usability and modest
requirements please post here with the info; i for one would love to
see how you solved a few of the hard details involved. ;)


best regards,





0. i have more to say, but also en route to Paris.  'till then,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to