Thanks for getting this started, Nick! I’ve added some comments and changes to
the trac ticket #12890.
All the best,
Rob
> On Dec 20, 2014, at 12:51 PM, Nick Mathewson wrote:
>
> Hi!
>
> So, Rob came up with this clever way to use help from an OS kernel to
> improve Tor's performance:
>
> ht
On Sat, Dec 20, 2014 at 2:09 PM, Nick Mathewson wrote:
> On Sat, Dec 20, 2014 at 4:56 AM, Yawning Angel
> wrote:
> And I think that the CREATE cell handler's code's implementation of
> the (deprecated) TAP protocol is vulnerable to the timing attack
> discussed in Goldberg's "On the Security of
On Sat, Dec 20, 2014 at 4:56 AM, Yawning Angel wrote:
[...]
> * How not to do Diffie-Hellman:
>
>key = pow(dh_received, dh_secret, DIFFIE_HELLMAN_MODULUS)
>
>This is relatively minor since recovering the secret key is trivial
>via PRNG attacks, so the fact that the modular exponentia
Hi!
So, Rob came up with this clever way to use help from an OS kernel to
improve Tor's performance:
http://www.robgjansen.com/publications/kist-sec2014.pdf
I've got a sketchy implementation together now.
See my comments on the end of ticket 12890. I have a branch which I
believe implements so
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Yawning Angel wrote:
> Hello all,
>
> Recently a decentralized onion-routing based Bittorrent client
> known as Tribler has made rounds through the clickbait
> garbage^w^wtech journalism sites. Since protocol design is a
> research interest of mine,
Hello all,
Recently a decentralized onion-routing based Bittorrent client known as
Tribler has made rounds through the clickbait garbage^w^wtech
journalism sites. Since protocol design is a research interest of
mine, I did some casual analysis based off the documentation and
publicly available sou