TransWikia.com

is this a threat to tor?

Tor Asked by user30454 on September 28, 2021

an adversary controls some middle nodes and they log ip adresses of users and times they connect. if an adversary controlled middle node receives traffic from one of their own controlled middle nodes the middle node logs the node the traffic is received from, and exit node that the traffic is to be passed on to and the time, will the adversary be able to find out what exit node a person used at a certain time?

One Answer

Yes if an adversary controls both a user's guard relay and a middle relay for one of the user's circuits, the adversary can know what exit relay was used for that circuit by the client (and the time it was used). But this doesn't really help the adversary since it doesn't tell them what the user was doing. Instead, they will try to control or monitor the guard relay and exit relay for a user's circuit; the middle relay doesn't matter. This allows the adversary to link the user to the domain of whatever website they're accessing.

Answered by Steve on September 28, 2021

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP