Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A malicious guard is just a malicious node. It can also be used as some other hop, or there can be non malicious nodes without a guard flag. I think there has been at least one publication taking a closer look at what malicious middle nodes can do.

I'm not familiar with bridges or the snowflake proxy but I think this would work:

Public bridges are public so no one cares about those. Now you run your own private bridge. First of all running your own leads directly back to you. Second it puts you on the list of even more paranoid people. Since you know and connect to that private bridge one can assume you trust that bridge for whatever reason which indicates some kind of "personal" relationship to that bridge.

The private bridge now connects to the second hop. This is a malicious one. The operator sees an IP which does not come from an official relay in the consensus. I don't know if a node knows he is in the middle (at least a guard and exit must know they are at the beginning and end of a chain, i guess?), but if he does he would now know that a private bridge is connecting to it. So you could enumerate private bridges.

If someone runs dozens of nodes, which is actually happening, this looks like a viable option. Correct me if I'm wrong.



Good questions :)

> First of all running your own leads directly back to you. Second it puts you on the list of even more paranoid people.

It doesn't point to "me", at least in meatspace or even as Mirimir. It points to some anonymous persona, created specifically for that purpose. On its own Whonix instance, through its own nested VPN chain, and using its own multiply mixed Bitcoin. All totally disposable.

And to be clear, I'd use a different anonymous persona for the onion service itself, created specifically for that purpose. With all the features described above.

> Since you know and connect to that private bridge one can assume you trust that bridge for whatever reason which indicates some kind of "personal" relationship to that bridge.

There are numerous private bridges, and many of them have only a few users. Perhaps even just one user.

> The private bridge now connects to the second hop. This is a malicious one. The operator sees an IP which does not come from an official relay in the consensus. I don't know if a node knows he is in the middle (at least a guard and exit must know they are at the beginning and end of a chain, i guess?), but if he does he would now know that a private bridge is connecting to it. So you could enumerate private bridges.

Sure. Authoritarian regimes do that all the time.

But here's the thing. My Tor client will still only use that bridge. So it can't be tricked into using a malicious bridge. And I can change private bridges frequently, if I like. It's not at all hard to configure them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: