[tor-dev] [CRITICAL] DeepCorr Traffic Confirmation Attack

2023-02-28 Thread Guard via tor-dev
Hi,

I was just reading a paper on traffic confirmation attacks over here
https://arxiv.org/pdf/1808.07285v1.pdf. This attack runs with the help of
deep learning algorithm called DeepCorr. This attack can be run in a Five
Eyes country or an authoritarian regime like Russia where companies are
compelled to cooperate with the government making this attack plausible.
The ISP and the website operators are the two endpoints for this attack.
This attack was able to achieve a success rate of over 96% which
represents a serious threat to Tor users in these regions. The paper also
includes some countermeasures on how to defeat this method of traffic
confirmation.

Thanks.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] [CRITICAL] Deep Fingerprinting Traffic Correlation

2023-03-01 Thread Guard via tor-dev
Hi,

I was the one who raised the issue of DeepCorr being able to perform
traffic correlation with a high degree of accuracy but it seems like that
WTF-PAD which is currently implemented in Tor does defend against the
DeepCprr attack. I could be wrong but this seems to be my understanding.
The feasability of this attack decreased when W-T (Walkie-Talkie) a half
duplex anti-traffic correlation startegy is used. The accuracy with a W-T
defense in place is 49% compared to a 90% accuracy with WTF-PAD. Thera
There has been a new deep learning attack which is extremely effective
against the current implementation of WTF-PAD in Tor. This new attacks is
called Deep Fingerprining proposed here :
https://arxiv.org/pdf/1801.02265.pdf.

Thanks

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev