juraj on Nostr: yes. it's an old attack, it will always be possible in the design of tor network ...
yes.
it's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network.
there are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time).
Published at
2024-09-18 19:22:53Event JSON
{
"id": "43be03d5097b6b6c95c5c569e35c850bd8bdb4d248e3ec67f58fb07a59b1780a",
"pubkey": "dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6",
"created_at": 1726687373,
"kind": 1,
"tags": [
[
"p",
"dab6c6065c439b9bafb0b0f1ff5a0c68273bce5c1959a4158ad6a70851f507b6"
],
[
"p",
"acbcd271eb28be60dde1def45f3619a7ab6fb1eb94a9dd2a9324c1dafd58de84"
],
[
"e",
"98239a7f9f901ca07656aad33d163d0a712ae4e2109716a4259f20f42376603e",
"",
"root"
],
[
"e",
"6300bd9f88e2a8a58a22f8ebe013c016c812438d26abc53837a1eadd16c74252",
"",
"reply"
]
],
"content": "yes.\n\nit's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network. \n\nthere are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time).",
"sig": "a0cb89557448f69162fc2606108a4e47a2db183d077ca25a607d073470ede43fb20e6e7e67b2125827ebd65682a2bd060e6ad42b2535168b2cbbecb69b423b6e"
}