Hacker News new | past | comments | ask | show | jobs | submit login

If they run enough nodes to deanonymize users, it's a dagger through the heart of other intelligence services, but an absolute blessing for the NSA



Hmmm almost like whoever has a head start and unlimited finances and resources due to being the reserve currency could have done exactly that.


For very obvious reasons you don't need to run any nodes, craft any malware, or scrutinize a target's layer 3+ OPSEC, in order to break Tor. You simply go to tier 1 ISPs and buy up IP datagram headers going to/from entry nodes and you win. The only solution is a constant rate of fake traffic to the guard node.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: