Hi I wanted to bring your attention to this recent Tor attack paper
published at the CCS conference:

https://arxiv.org/pdf/1808.07285.pdf


>     We show that with moderate learning, DeepCorr can correlate Tor 
> connections (and therefore break its anonymity) with accuracies significantly 
> higher than existing algorithms, and using substantially shorter lengths of 
> flow observations. For instance, by collecting only about 900 packets of each 
> target Tor flow (roughly 900KB of Tor data), DeepCorr provides a flow 
> correlation accuracy of 96% compared to 4% by the state-of-the-art system of 
> RAPTOR using the same exact setting.
> 
>     We hope that our work demonstrates the escalating threat of flow 
> correlation attacks on Tor given recent advances in learning algorithms, 
> calling for the timely deployment of effective countermeasures by the Tor 
> community.


It has an extremely high true positive rate under real world conditions.
The two main suggested countermeasures are padding and AS-aware path
selection. I think you are working on the former but no practical
implementation of the latter is  ready?
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to