Skip to content

isabella232/anomalous-tor-keys

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

We have just published a (not yet peer-reviewed) technical report entitled "Anomalous keys in Tor relays." https://nymity.ch/anomalous-tor-keys/

The project was inspired by the "Mining Your P's and Q's" paper from Heninger et. al., and in it, we take a closer look at the RSA keys used in Tor since 2005. We found that entities had purposely created anomalous keys in order to attack Tor's onion services and that researchers had inadvertently created weak keys while conducting experiments on Tor. (None of the weak keys we found are affecting the current Tor network.)

We welcome your questions and feedback!

Regards, George, Claudia, Laura, & Philipp

About

Analysis of archived Tor relay RSA public keys

Resources

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • TeX 47.7%
  • HTML 44.4%
  • Go 4.5%
  • Python 3.2%
  • Makefile 0.2%