Rob Graham, CEO of penetration testing firm Errata Security, arrived at
that conclusion by running his own "hostile" exit node on Tor and
surveying the encryption algorithms established by incoming connections.
About 76 percent of the 22,920 connections he polled used some form of
1024-bit Diffie-Hellman key.
...
He went on to cite official Tor statistics
to observe that only 10 percent of Tor servers are using version 2.4 of
the software. That's the only Tor release that implements elliptical
curve Diffie-Hellman crypto, which cryptographers believe is much harder to break. The remaining versions use keys that are presumed to be weaker.
No comments:
Post a Comment