re: grarpamp
I am writing a possible countermeasure which uses transactional requests.
You submit entire requests which are processed by the exit node. Several
other situations can take place while routing to the exit node. It would
also only require exit nodes to have updated to the newer featu
hella old news. oh look here's POC for end to end correlation
https://var.thejh.net/git/?p=detour.git;a=blob;f=README
but why bother chatting about this since it's explicitly not
in Tor's threat model to protect against a global passive adversary?
if you want to protect against that then look int
re: "tcp_tracing_internet.pdf"
This appears to describe an active network modulation attack (node DoS).
Either hammer tree on nodes of the expected path and trace the modulation,
or on all but the expected path to find unmodulated.
It generally requires GPA, deploying nodes, or being one end of th
Are you trolling us? I don't get it!
On Sun, Apr 09, 2017 at 08:19:28PM -0400, Mike Guidry wrote:
> Hello,
>
> Here is a document I've wrote regarding a concept to trace connections even
> through TOR. If you have any questions feel free to respond, and I'll
> attempt to explain. I have also
Hello,
Here is a document I've wrote regarding a concept to trace connections even
through TOR. If you have any questions feel free to respond, and I'll
attempt to explain. I have also considered a way to mitigate this
situation being allowing TOR to be traced by using 'Transactional
Requests.'