Skip to content
Snippets Groups Projects
Closed Add "Does Tor resist "remote physical device fingerprinting"?"
  • View options
  • Add "Does Tor resist "remote physical device fingerprinting"?"

  • View options
  • Closed Issue created by Gus

    We need to update this answer.

    Yes, we resist all of these attacks as far as we know.

    These attacks come from examining characteristics of the IP headers or TCP headers and looking for information leaks based on individual hardware signatures. One example is the Oakland 2005 paper that lets you learn if two packet streams originated from the same hardware, but only if you can see the original TCP timestamps.

    Tor transports TCP streams, not IP packets, so we end up automatically scrubbing a lot of the potential information leaks. Because Tor relays use their own (new) IP and TCP headers at each hop, this information isn't relayed from hop to hop. Of course, this also means that we're limited in the protocols we can transport (only correctly-formed TCP, not all IP like ZKS's Freedom network could) -- but maybe that's a good thing at this stage.

    https://2019.www.torproject.org/docs/faq.html.en#RemotePhysicalDeviceFingerprinting

    Linked items ... 0

  • Activity

    • All activity
    • Comments only
    • History only
    • Newest first
    • Oldest first
    Loading Loading Loading Loading Loading Loading Loading Loading Loading Loading