[Tails-dev] Active fingerprinting defense: CPU induced Packe…

Delete this message

Reply to this message
Author: procmem@riseup.net
Date:  
To: tails-dev, whonix-devel-owner, adrelanos
Subject: [Tails-dev] Active fingerprinting defense: CPU induced Packet timing
Hi Tails guys. I opened a ticket for more details about a covert channel
issue that was discussed a while back an wanted to kick off the
conversation about this attack vector and help with a solution.

Summary: Attacker controlled CPU activity has a direct effect on
inter-packet timing, readily visible on the network. Think of JS running
in TBB or deliberate resource requests in case of an onion service.

In the ticket i outline the progress of a fix and a possible solution we
can deploy if it is tested to be effective:

https://redmine.tails.boum.org/code/issues/17156