The paper “50 Bucks Attack on Tor“, submitted as short paper to NordSec, has been accepted. In the paper, we look on Tor’s attacker model from a more practical side and assume a local network administrator as a potential adversary. In addition, we assume that the attacker has 50 € available for operating a Tor relay. The question of the paper is: How long does Tor protect the user’s favorite websites given our scenario. We answer this question by providing a stochastical model estimating the number of circuits required to deanonymize n favorite websites of the user. By simulating the path selection algorithm with a current Tor network state, we demonstrate the feasibility of the attack.
Institutions
Anonymous Communication
-
Recent Posts
Meta