top | item 46050624

Counter Galois Onion: Improved encryption for Tor circuit traffic

104 points| wrayjustin | 3 months ago |blog.torproject.org

31 comments

order

amelius|2 months ago

> Of course, we need to make sure that the data isn't modified on the way from the client.

Why is this necessary if every layer of the onion is a trustable encrypted link?

MzxgckZtNqX5i|2 months ago

Relays can be malicious and try to tamper with the data. Think of Tor relay encryption like Signal's E2E encryption, where the relays are analogous to Signal's servers. You want to ensure they can neither see what you sent (confidentiality) nor modify it without detection (integrity).

47282847|3 months ago

Cool! Congrats! Awesome work.

Small typo: “observing predicatable changes“

sevg|2 months ago

I think you’re getting downvoted because you’re reporting the typo in an odd and likely unproductive place.

I’m not sure what you expect HN readers to do about the typo. There is a comment section on the blog itself :)

greekrich92|2 months ago

Is it quantum-proof?

vscode-rest|2 months ago

Quantum isn’t the problem. Majority-internet telemetry is.

ekjhgkejhgk|2 months ago

Is it alien-proof?

m00dy|2 months ago

hey guys, anyone believes Tor still can provide anonymity to users ? just trying to ask politely.

ongy|2 months ago

Low stakes (IP violations etc.): absolutely

High stakes (military / nation state scale): no

lurker_jMckQT99|2 months ago

hey, would you mind elaborating (with sources)?

jstanley|2 months ago

This FUD comes up whenever Tor is mentioned on Hacker News. The answer is: let's say you think Tor isn't 100% flawless. What are you going to do? Not use Tor? It's better than any other option.