Home > slashdot > Attacking and Defending the Tor Network

Attacking and Defending the Tor Network

March 29th, 2011 03:31 admin Leave a comment Go to comments


Trailrunner7 writes “In a talk at the USENIX LEET workshop Tuesday, Nick Mathewson of the Tor Project discussed the group’s recent challenges in responding to suppression efforts by governments in Egypt, China and elsewhere. What the Tor members have learned in these recent incidents is that while governments are becoming more up front about their willingness to shut off Internet access altogether or censor content, users are also becoming more resourceful. Mathewson said that the group is working on methods for alleviating the problems that national-level restrictions cause for Tor users. One method involves moving to a modular transport method in order to get around some of the throttling that ISPs perform on encrypted traffic in order to make Tor usage more difficult. In a separate talk at LEET, Stevens LeBlond of INRIA in France presented research on methods for tracing Tor users back to their IP address. One of the attacks, which LeBlond and his co-authors titled “Bad Apple,” used an exit node that the researchers controlled in order to trace the streams of data sent by users of BitTorrent over Tor back to their IP addresses.”

Source: Attacking and Defending the Tor Network

Related Articles:

  1. German Chancellor Proposes European Communications Network
  2. Scientists Detect Two Dozen Computers Trying To Sabotage Tor Privacy Network
  3. Encrypted VoIP Meets Traffic Analysis
  4. ISPs Throttling BitTorrent Traffic, Study Finds
  5. AT&T Threatens To Shut Off Service of Customer Who Won Throttling Case
blog comments powered by Disqus