in https://www.torproject.org/docs/faq#EntryGuards say:
... So, what should we do? Suppose the attacker controls, or can observe, *C*relays. Suppose there are *N* relays total. If you select new entry and exit relays each time you use the network, the attacker will be able to correlate all traffic you send with probability *(c/n)2*. But profiling is, for most users, as bad as being traced all the time: they want to do something often without an attacker noticing, and the attacker noticing once is as bad as the attacker noticing more often. Thus, choosing many random entries and exits gives the user no chance of escaping profiling by this kind of attacker. Today there are: N = +/- 4000 [1] C = number of relay (relay over ISP, traffic **between Ases and IXPS factor ) observed from NSA - are there studies that indicate the amount of relay, ixps, isp, compromised by nsa? thanks. [1] - https://metrics.torproject.org/network.html ... On Sun, Sep 8, 2013 at 3:28 PM, Nathan Suchy < [email protected]> wrote: > Is it possible for me to force my client to connect to my tor exit as the > middle node? > > > On Sun, Sep 8, 2013 at 1:11 PM, Paul Syverson <[email protected] > >wrote: > > > On Sun, Sep 08, 2013 at 11:47:06AM -0400, Nathan Suchy wrote: > > > Would my traffic still be secure? > > > > > > > To do what, and secure against whom and to what degree? > > > > It is reasonable to assume that if NSA is running Tor nodes, then they > > are probably using good operational security. So against someone > > breaking into those nodes and then attacking you, you are probably > > more secure than using random nodes. (But see below.) > > > > If you mean secure against the NSA node operators, then no. Any > > adversary that owns all the nodes in your route should be able to > > learn pretty much everything about your traffic patterns, who you're > > talking to and when. This is true for the NSA or anybody else. > > > > If you mean intentionally selecting some subset of nodes because you > > trust them more or because you are trying to avoid them as adversary > > nodes, there is a tradeoff between the potential better security that > > might provide and what your choice might reveal about you. cf. > > "Trust-based Anonymous Communication: Adversary Models and Routing > > Algorithms". There's currently research advances but no simple advice > > on that score. > > > > This all assumes adversaries just live at the nodes rather than also > > at the ISPs, the ASes, the IXPs, etc. It is hard to say anything more > > about such an adversary without more details. You might want to see > > "Users Get Routed: Traffic Correlation on Tor By Realistic > > Adversaries" and some of the earlier work on this issue cited therein. > > > > HTH, > > Paul > > -- > > tor-talk mailing list - [email protected] > > To unsusbscribe or change other settings go to > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > > > > > -- > Nathan Suchy > If this email was not intended for you delete it and any copies you have of > it. The email was intended for "FirstName LastName". Information in this > email may be confidential and releasing it may be a violation of US law. > -- > tor-talk mailing list - [email protected] > To unsusbscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- Noilson Caio Teixeira de Araújo http://ncaio.wordpress <http://ncaio.ithub.com.br>.com<http://ncaio.ithub.com.br> http://br.linkedin.com/in/ncaio http://www.commandlinefu.com/commands/by/ncaio http://www.dicas-l.com.br/autores/noilsoncaioteixeiradearaujo.php -----BEGIN PGP PUBLIC KEY BLOCK----- mQENBFIrMksBCACr0/NhLdhcVFP1b+hY9L0lI2PedkmxGDShrcxuqlEN7ezPPRLi YZz/yrpBnOYcihozjE4u/ww6S2V7H9Bq47BrpDtZy3ftSEw/Hu2fFPbwjjc34g8P zW/YZ8LGry01+h4TAEjGEC9oVWkYFPleZ5+hsPayknz19qwEZDcfX6KJB855ufvK jliIVYXhSuNraRXa5+MjLe2dxyQC/Hjteve4T1iG8aLltPg7qptaVXKT2Lx3yCYK CyrGd1raoB1DGW07Q4wpXIK9yHalCQi8WYxl86+FDtzfr4jTZ+UyZn/l8MqtHOMs mA0v8ewvQYz/MD+FJ4RX1wpu7NpweiQActO7ABEBAAG0NE5vaWxzb24gQ2FpbyBU ZWl4ZWlyYSBkZSBBcmF1am8gPGNhaW9nb3JlQGdtYWlsLmNvbT6JAT4EEwECACgF AlIrMksCGwMFCQHhM4AGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEPhs49Zl Qcdt3BgH/3iPksYhBJEJlXLGMxD/5D2o2cosORfzJMwzSsyFjx/m1XaK9PS3rpHk kGaIClDxRdtdpPcz88a9w74uxo64e4o6sXgaUiS8GFNyIbKQbXfs4IbJfSMiFuFG z/6tgvQ6DVw9MvAuxi0e59VZnb2pbbDgCkXKxhcQI6296ODX0AZp11mBrNC5GLuh i1rgCKurMchnsEuylfljThI03rQgH4TeeYZqaip7RqBeTyYRcNnrXk9irc3jlb4g cOORoDyBrrKX3tnncsGpvAmXKKIuii336YhkuQdbvgFb2035fvqCOmhiu3NYnXFA PqEfId2LA0jSJI6pH/UVzP8BSUzUsrq5AQ0EUisySwEIAMpxB/AaTk35y5NDU3Ic HWBT+SHR0OtMDUhbv9Gmk4lj28/1+hDzMIpPJ+pDYX5MMhEcrHFPBOD7sCA2MEoA 0z7QWsB2CICk6E4Zrik2WAXutbc/OUVNTR3UlLvzrdsX3ynzsEC8KMDehVQyH882 OGRY1OE6dZ9vau5TTcgQWvlPokyMZjDj07HYZYe9Yo+0PASUAOT282vkZh6dRC0H fce/XfcdUxP2gkpfMw5QvOoasr3TRC7r66GhBUeGK79Gi/tTKGb8955YNkJzyfJH ziPUWi/grm6htJnnfCHqQIMrjygU8gsFKqug7iv2cDYhKL43KfEvnz/wWji262rt 3/8AEQEAAYkBJQQYAQIADwUCUisySwIbDAUJAeEzgAAKCRD4bOPWZUHHbaD7B/9V a6R1KkiAMs1Naeg9Ve0YBxZfQ1WSyzNTVIR9Vcl/5c1PBalniRIERrvH586BDGQe nwjRFcZ6SEBEo2EJRlffB6n6kjD84b/zF9Grg/ubnvjKIp4lbhpAaVFJ2F6A8kV5 J9PXGWpH8P1Pyis0TDgUHRZuF/BD1o2KVhJXKY0kvD8xc8ZNPh1BGcmU2q3++Wpa AHMk2+uFROwHGTQsLMvLiYpaiD78ZSn73RmWsr8VflYbdnY6owhkbBkYIIk7vo3T lNTLaBBJ236hAheF8DF+RK3KiN+zpV4nxuKQ2N2QU/a7M2+0VNtHougMmKnuEMdS MNTlJhQf0dK3EMRyaHHe =caNZ -----END PGP PUBLIC KEY BLOCK----- -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
