If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Rate Thread | Display Modes |
#1
|
|||
|
|||
low latency attacks on the browser
Could this simple approach be at all effective against latency attacks?
I am not a professional so this question may be stupid. What I know is that the tor browser bundle is low latency. I've been told that low latency introduces unavoidable pitfalls. The main unavoidable pitfall as I understand it is at both ends. That is, an adversary at the first hop can be also at the last hop. If they are at both hops, the low latency gives them important clues. a. Bob starts a Tor circuit at 10:01:01am, sending 101 bytes of data b. At 10:01:02am, Alice's server gets a connection of 101 bytes of data My question is whether it is at all useful to "just wait" some time? Would this simple approach be at all effective against latency attacks? a. Bob starts a Tor circuit at 10:01:01am & just sits there b. At some arbitrary point later, Bob connects to Alice's server |
Ads |
Thread Tools | |
Display Modes | Rate This Thread |
|
|