[Whonix-devel] Defeating TCP ISN skew attacks with SipHash or BLAKE2

bancfc at openmailbox.org bancfc at openmailbox.org
Thu Jan 12 03:50:14 CET 2017

After discussing this with the Tor developers it turns out the specific 
fingerprinting attack I pointed out before still remains. [1] I 
understand your priorities probably lie elsewhere but can you please 
consider patching the secure_seq.c:seq_scale() timer out of the ISN code 
to close up this risk?

- my original question


More information about the Whonix-devel mailing list