If you generate numerous identities (public keys) for yourself and interact online using
those different identities: (check all that apply)
It is essential to have a good source of randomness. Otherwise adversaries might be able to deduce your secret key and take control of your identities. (Correct, this is important)
Adversaries may be able to link your identities because public keys generated on the same computer tend to look similar.(Any reasonable pseudorandom number generator should not 'look' similar)
Adversaries may be able to de-anonymize you by analyzing your activity patterns. (Correct, this is important)
The activity pattern analyzing attack pattern is pretty interesting.
It is essential to have a good source of randomness. Otherwise adversaries might be able to deduce your secret key and take control of your identities. (Correct, this is important)
Adversaries may be able to link your identities because public keys generated on the same computer tend to look similar.(Any reasonable pseudorandom number generator should not 'look' similar)
Adversaries may be able to de-anonymize you by analyzing your activity patterns. (Correct, this is important)
The activity pattern analyzing attack pattern is pretty interesting.
No comments:
Post a Comment