[Cryptography] Are Tor hidden services really hidden?

John Kelsey crypto.jmk at gmail.com
Sun Mar 2 08:07:59 EST 2014


The Tor Users Get Routed paper does some pretty solid-looking calculations on how long it should take for a given attacker to deanonymize a given kind of user.  For resourceful attackers, it's a lot shorter time than you'd think.  I very much recommend the paper to everyone.

John Young has the paper up at http://cryptome.org/2013/08/tor-users-routed.pdf

--John Kelsey
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140302/5d133ec3/attachment.html>


More information about the cryptography mailing list