On Mon, 25 Jan 2016 10:25:20 -0500
Paul Syverson <paul.syver...@nrl.navy.mil> wrote:


> "20,000 In League Under the Sea: Anonymous Communication, Trust,
> MLATs, and Undersea Cables" available at
> http://www.degruyter.com/view/j/popets.2015.1.issue-1/popets-2015-0002/popets-2015-0002.xml?format=INT


        As far as I can see, most if not all of the paper deals with a
        way to organize information about 'network topology' but
        there's no concrete data regarding which
        systems/relays/cables/people/IXPs/ASs/whatever are
        'compromised'.

        ...though the section on cables and cooperation between so
        called nation states seems to suggest that virtually all the
        world's infrastructure is 'compromised'?
        
        Also, is there a more concrete analysis of what can be
        achieved by monitoring traffic on those cables? Specifically,
        how easy it is for your government to find users and especially
        servers in the tor network or similar networks (i2p, freenet
        etc)


        There's also mention of 'user beliefs' and 'trust'. That
        strikes me as weird. You seem to be saying that routes
        can be choosen according to users' beliefs, not according to
        real world facts? It doesn't matter if system X is hostile,
        what matters is what the user believes about system X? Am I
        missing something? 

        And what's the engineering definition of trust? And the units
        used to measure it? 
 

> 
> This is ongoing evolving research. This is not ready for deployment
> for everybody's Tor clients to do their own trust-aware route
> selection.  And, one of the observations of this work is that you
> should probably always use the default settings unless you have
> specific other adversaries in mind and understand how diverging from
> the pack will affect you.  What this work will do is help people who
> want to use different route selection choices to understand those
> choices, and it will eventually impact the default and alternative
> route selections built into the Tor software.  
> 
> It also focuses just on route selection.  Tor does other things to
> diversify trust.  For example, Tor's binaries have for the last few
> stable releases reflected reproducible (or determistic) builds, which
> means that people can independently verify that the officially
> distributed binaries are compiled from the officially distributed
> source programs. If they did not match, anyone could test and expose
> that.  See
> https://blog.torproject.org/category/tags/deterministic-builds
> 
> aloha,
> Paul

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to