Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nitpicking over the threat model and "breaking Pond" #185

Open
sycamoreone opened this issue May 23, 2015 · 0 comments
Open

Nitpicking over the threat model and "breaking Pond" #185

sycamoreone opened this issue May 23, 2015 · 0 comments

Comments

@sycamoreone
Copy link

The Technical documentation states that

Pond assumes the existence of an overlay network that prevents a network attacker from learning which servers a user is connecting to. [...]
Since a global, passive attacker can deanonymise Tor, that attacker is capable of violating this assumption and breaking Pond.

This is unfortunately true but not actually a "break of Pond" according to the threat model, which allows that

  • A GPA can learn who is using Pond and where their home servers are located.
  • A GPA can learn when messages are sent to a non-home server and which server that is.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant