Revisit network fingerprinting design wrt. NTP
What kind of fingerprinting resistance a system like Tails can reasonably pretend to, at the network scale? How safe is the current "Tor, nothing else, no NTP"? Shall we emmit a fake NTP query (when others that usually do) and drop it, as suggested by adrelanos?
See "secure and simple network time (hack)" thread or tor-talk, around July 2012.
Also see discussion about fingerprinting on Time syncing.
Related issues
- Related to #5774
- Related to #5424 (closed)
-
Blocked by #5975 (closed)
Original created by @tails on 5773 (Redmine)