The embargo of our paper "Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache" has been lifted (@pulls).

usenix.org/conference/usenixse

We show that a remote attacker can probe the state of DNS caches at Tor exit relays without false positives; we also provide short-term mitigations (merged), and evaluate a long-term defense with privacy-preserving DNS cache measurements at exits operated by @dfri (@ln4711 @jn9999 @eliasr). Ironically, the long-term defense could boost cache-hits by 2-3x.

Follow

@rgdd

Great!

What does it mean that there was an embargo, what kind of embargo, why?

@pulls @dfri @ln4711 @jn9999

@eliasr: embargo here refers to the paper not being openly accessible despite being accepted for publishing, with the motivation to coordinate around mitigations and defenses in the following (at the time confidential) TROVE:

gitlab.torproject.org/tpo/core

Sign in to participate in the conversation
Librem Social

Librem Social is an opt-in public network. Messages are shared under Creative Commons BY-SA 4.0 license terms. Policy.

Stay safe. Please abide by our code of conduct.

(Source code)

image/svg+xml Librem Chat image/svg+xml