Just a quick question, might be stupid: if you were to run all of your traffic through a VPN, including tor, would the same considerations apply?
Or would they only apply to your VPN provider (provided that they keep records at all)...? Phillip > MAC addresses are used by layer 2 protocols (see > https://en.wikipedia.org/wiki/OSI_model ). Once an IP packet > traverses a layer 3 device (such as a router) the srcMac has been > changed to that of the router's egress interface. Unless your ISP > provided your router, srcMac identifies only which router the packet > came from, not the particular client. > > Decent routers randomize source ports to prevent traffic correlation > (makes it harder to confirm that two streams from the same router came > from the same client). > > If you need deniability, don't use an ISP provided router, make sure > your router randomizes source ports, and have an open guest wifi > network (though obviously make sure the guest network can only access > the Internet, not your LAN). > > -Pascal > > > On 4/21/2012 1:05 PM, Ondrej Mikle wrote: >> If the ISP's records store [srcIP, srcPort, srcMac, dstIP, dstPort, >> size, >> startTime, endTime] for every TCP connection, then it's definitely >> doable; note >> that srcMac is MAC of client visible from ISP's side of the router to >> internet >> (so that clients behind NAT can be identified, though the srcPort >> gives that >> away, too). > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk