Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't think he's saying that at all. I interpreted it as, given unlimited resources, Eve can determine that Alice and Bob are communicating over encrypted channels which, for Alice and Bob, is almost as bad as having their encryption broken.


I took that to be a specific example -- Tor may be detected using traffic analysis -- of a more general principle -- circumvention tools can not hope to withstand nearly unlimited resources. I thought tptacek was pretty explicit in making this more general statement.


One thing that a lot of circumvention tool promoters get wrong is the threat model. The threat model isn't "attacker can read your traffic" --- although some of the best known circumvention tools have made cryptographic mistakes that did allow that. The threat model is "tractable attacks that isolate traffic using your tool from bulk Internet traffic".

A torture cell will do just peachy at decrypting the actual packets.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: