summaryrefslogtreecommitdiffhomepage
path: root/blog/entry/torweaknesses.mdwn
diff options
context:
space:
mode:
authorSean Whitton <spwhitton@spwhitton.name>2015-11-18 10:09:12 -0700
committerSean Whitton <spwhitton@spwhitton.name>2015-11-18 10:09:12 -0700
commitdeb4807989d127e40e44c1192477c40e30f88180 (patch)
tree41e557cc82e01b0e76de8d4f548105023af8dfee /blog/entry/torweaknesses.mdwn
parent675d02fc2c3d2bfb53a81db6d2c55f0dfbbd79ed (diff)
downloadwiki-deb4807989d127e40e44c1192477c40e30f88180.tar.gz
imported PyBlosxom entries and comments
Diffstat (limited to 'blog/entry/torweaknesses.mdwn')
-rw-r--r--blog/entry/torweaknesses.mdwn13
1 files changed, 13 insertions, 0 deletions
diff --git a/blog/entry/torweaknesses.mdwn b/blog/entry/torweaknesses.mdwn
new file mode 100644
index 0000000..6225fb2
--- /dev/null
+++ b/blog/entry/torweaknesses.mdwn
@@ -0,0 +1,13 @@
+[[!meta date="2013-04-18 09:56:00"]]
+[[!meta title="Weaknesses of Tor"]]
+[[!tag imported_PyBlosxom tech security]]
+
+[Practical Vulnerabilities of the Tor Anonymity
+Network](http://www.syverson.org/tor-vulnerabilities-iccs.pdf)
+
+> Lesson one is that Tor guards against traffic analysis not traffic
+> confirmation. If there is reason to suspect that a client is talking
+> to a destination over Tor, it is trivial to confirm this by watching
+> them both.
+
+Good to know.