FINDING · DEFENSE

COR does not solve the bootstrapping problem: a user's first connections to the COR bootstrapping network are vulnerable to the same IP-enumeration and blocking attacks as public Tor directory connections. To mitigate directory-partitioning attacks, directory retrieval is always performed through an existing COR circuit, and directories return only a random subset of available nodes rather than the full list—but this subset-delivery design is itself exploitable by a malicious directory that can fingerprint users via uniquely-assigned relay subsets.

From 2011-jones-hidingHiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing · §2.3, §3.1, §5 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ip-blockingactive-probing
defenses
torbridges

Extracted by claude-sonnet-4-6 — review before relying.