[Freedombox-discuss] BitMessage

Eugen Leitl eugen at leitl.org
Tue Apr 2 09:55:07 UTC 2013

On Mon, Apr 01, 2013 at 03:23:39PM -0400, Sam Hartman wrote:
> In general, anonymity systems have huge practical constraints and even
> things like TOR are subject to various traffic analysis attacks.

One quibble: it's Tor, not TOR.

> Privacy is really hard and the best we can do is still vulnerable to
> some quite practical approaches.
> TOR for example is reasonably vulnerable to attacks to figure out origin
> near the origin and to figure out the server near the server.
> It's reasonably vulnerable to attacks to figure out both if you control
> enough nodes in the network.
> Where enough  isn't that large if you have some money to throw around.
> To be clear, the TOR Project is very good at trying to accurately
> describe what privacy they can and cannot provide.

More information about the Freedombox-discuss mailing list