[tor-talk] Statistics from TDP

2017-08-08 Thread George
Part of the Tor BSD Diversity Project's role has been to highlight the
lack of operating system diversity in the Tor network in order to begin
rectifying it.

There are plenty of resources to show Tor network statistics, from the
(deprecated?) torstatus sites such as https://torstatus.bluemagie.de/
and https://atlas.torproject.org/ based on JSON-data. We developed a
shell-based (easily) portable solution for creating and generating Tor
reports based on the JSON data:

https://github.com/torbsd/tdp-onion-stats/

This replaces our old (and ugly) "Quick & Dirty Stats."

Current report outputs are listed here:

https://torbsd.github.io/oostats.html

... but the code can be cloned and tinkered with by anyone for whatever
purposes.

The README.md
(https://github.com/torbsd/tdp-onion-stats/blob/master/README.md) should
enough of a guide for many people.

g

-- 



5F77 765E 40D6 5340 A0F5 3401 4997 FF11 A86F 44E2



signature.asc
Description: OpenPGP digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Comments?

2017-08-08 Thread Paul Syverson
On Mon, Aug 07, 2017 at 09:32:20AM +0200, Jon Tullett wrote:
> On 4 August 2017 at 02:05, Paul Syverson  wrote:
> > On Thu, Aug 03, 2017 at 04:38:49PM -0700, Jacki M wrote:
> >> Comments on Paul Syverson Proposed attack?
> >> Paul Syverson - Oft Target: Tor adversary models that don't miss the mark
> >> https://www.youtube.com/watch?v=dGXncihWzfw
> >>
> > More seriously. The point of this work is not to propose attacks per se
> > but to observe that a Tor adversary intending to target individuals or
> > specific groups might be much more effective against those targets
> 
> Enjoyed the video - thanks Paul. It cut off before Q&A...were there
> any particularly good questions from the audience?

Ermm probably? I just don't recall completely now weeks later, though
I remember we did fill up the remaining time. Let's see, I had an
exchange with ermm maybe Prateek Mittal, where in response to his
question I emphasized that we weren't suggesting ignoring the
prospects of a hoovering adversary. In fact hoovering might be the
source of some of the inputs an adversary might use to decide to
target an individual, group, or destination. But, it would then be
more likely for the reasons I presented, for an adversary to follow a
targeting strategy even if it had hoovering capabilities already set
up.

Another point that was raised to me in a side comment after the Q&A
was that what I said about evidence for onionsite fingerprinting from
the Oakland poster by Juarez et al.could have been interpreted
differently than I intended.  They showed in that work that
identifying a circuit as an onionsite connection (vs. not an onionsite
connection) via fingerprinting from the middle relay on the client
side was 99.98% effective. They didn't address fingerprinting specific
sites therein. I stand by our claim that given the smallness of the
space and other factors that such fingerprinting is likely for current
Tor and onionspace to be very effective. (Once we make all my
grand-vision changes to onionspace that I'll talk about in my ESORICS
keynote paper, that could well change. But that's c. 5-10 years away
at this point.) Which leads us to...

> 
> Curious to know - at a practical level, have you actually tried any of
> it in practice, or had any contact with anyone who has? I mean, do the
> results in practice mirror the predictions in terms of distribution
> and probability ito deanonymising potential targets?

No we haven't yet tried this in practice. As usual, it is hard to set
up an experiment like that in a way that adequately protects user
safety and privacy. There is work in progress that has gone through
review by the Tor Research Safety Board and will use PrivCount to
gather information about the amount of activity on a particular known
and public onionsite.  But it's still very much in the works.

HTH,
Paul
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Comments?

2017-08-08 Thread flipchan
Seems like the usual stuff when I was working on my obfusication 
project(layerprox) I added dummy traffic generation to avoid correlation 
attacks. But what's wrong is that people will download the entire lists of ips 
of all nodes and blacklist them /add them in snort/bluecoat-squidproxy conf.

On August 4, 2017 1:38:49 AM GMT+02:00, Jacki M  wrote:
>Comments on Paul Syverson Proposed attack?
>Paul Syverson - Oft Target: Tor adversary models that don't miss the
>mark
>https://www.youtube.com/watch?v=dGXncihWzfw
>
>-- 
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
Take Care Sincerely flipchan layerprox dev
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Comments?

2017-08-08 Thread Jon Tullett
On 8 August 2017 at 19:18, Paul Syverson  wrote:
> On Mon, Aug 07, 2017 at 09:32:20AM +0200, Jon Tullett wrote:
>> On 4 August 2017 at 02:05, Paul Syverson  wrote:

>> Curious to know - at a practical level, have you actually tried any of
>> it in practice, or had any contact with anyone who has? I mean, do the
>> results in practice mirror the predictions in terms of distribution
>> and probability ito deanonymising potential targets?
>
> No we haven't yet tried this in practice. As usual, it is hard to set
> up an experiment like that in a way that adequately protects user
> safety and privacy. There is work in progress that has gone through
> review by the Tor Research Safety Board and will use PrivCount to
> gather information about the amount of activity on a particular known
> and public onionsite.  But it's still very much in the works.
>
> HTH,

It does. Thanks for the feedback!

-J
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk