• ExtremeDullard@lemmy.sdf.org
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    2 hours ago

    The TOR network itself is safe - at least assuming the TLAs don’t control at least half of the nodes, which is far from impossible. But let’s assume…

    The weak point comes from the browser: that’s how the fuzz deanonymizes users. The only safe browser to use on TOR is the TOR browser, and that’s the problem: it disables so many unsafe functionalities that it’s essentially unusable on a lot of websites. So people use regular browsers over TOR, the browser leaks identifying data and that’s how they get caught.

  • MigratingtoLemmy@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    ·
    6 hours ago

    If I understand correctly, stream isolation will route different connections through different circuits. If you’re doing two different things of a sensitive nature, open different browsers and applications, use random user-induced delays in your actions/responses and PGP-encrypt everything. And listen to what the TOR project says about the mitigations. I have some reading to do myself I guess

  • ShortN0te@lemmy.ml
    link
    fedilink
    arrow-up
    32
    arrow-down
    2
    ·
    11 hours ago

    This attack has been known for years now. And tor is simply not able to defend against it without a complete redesign.

    • orcrist@lemm.ee
      link
      fedilink
      arrow-up
      13
      ·
      3 hours ago

      The potential for timing attacks has been known since the beginning of Tor. In other words, more than a decade. But that doesn’t mean you can’t defend against it. One way to defend against it is by having more nodes. Another way is to write clients that take into account the potential for timing attacks. Both of these were specifically mentioned in the article.

      Based on what was in the article and what’s in the history books, I’m not sure how to interpret your comment in a constructive way. Is there anything more specific you meant, that isn’t contradicted by what’s in the article?

      • ShortN0te@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        7 minutes ago

        Yes, sorry i worded it incorrectly you can try to make it harder but timing attacks are still possible.

        Nope, just a summary that this is just old news. There is nothing new in the article.