"Low-Resource Routing Attacks Against Anonymous Systems"
James Muir
jamuir at scs.carleton.ca
Mon Feb 26 18:47:25 PST 2007
James Muir wrote:
>No one seems to have posted this to the list yet, so I thought I should:
>
>"Low-Resource Routing Attacks Against Anonymous Systems",
>K. Bauer, D. McCoy, D. Grunwald, T. Kohno, D. Sicker
>Technical Report, University of Colorado
>
>http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-0
7.pdf
>
>
>It was posted on Slashdot:
>
>http://yro.slashdot.org/yro/07/02/25/1913219.shtml
For those interested, here is someone's official response about the
Technical Report and its implications for the Tor network:
http://blogs.law.harvard.edu/anonymous/2007/02/26/the-rumors-of-our-demise/
Does anyone know who authored that? It seems a bit strange to have an
anonymous official statement, but maybe this is appropriate for Tor ;-)
Here is an FAQ by one of the Tech Report's authors:
http://home.cs.colorado.edu/~bauerk/faq.html
-James
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
More information about the cypherpunks-legacy
mailing list