Skip to content

Revisit network fingerprinting design wrt. NTP

What kind of fingerprinting resistance a system like Tails can reasonably pretend to, at the network scale? How safe is the current "Tor, nothing else, no NTP"? Shall we emmit a fake NTP query (when others that usually do) and drop it, as suggested by adrelanos?

See "secure and simple network time (hack)" thread or tor-talk, around July 2012.

Also see discussion about fingerprinting on Time syncing.

Related issues

Original created by @tails on 5773 (Redmine)

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information