▲ | trod1234 9 days ago | |||||||||||||||||||||||||||||||
There are a couple of ways. The main one is called an Eclipse Attack in cyber circles, and it can be done at any entity operating at the ASN layer so long as they can position themselves to relay your traffic. The adversary can invisibly (to victim PoV) modify traffic if they have a cooperating rootPKI cert (anywhere in the ecosystem) that isn't the originating content provider, so long as they recognize the network signature (connection handshake); solely by terminating encryption early. Without a cert, you can still listen in with traffic analysis, the fetched traffic that's already been encrypted with their key (bit for bit), as known plaintext the math quickly reduces. SNI and a few other artifacts referencing the resources/sites are not part of the encrypted payload. Its more commonly known in a crypto context, but that kind of attack can happen anywhere. It even works against TOR. One of the first instances (afaik) was disclosed by Princeton researches in 2015, under the Raptor paper. | ||||||||||||||||||||||||||||||||
▲ | EE84M3i 9 days ago | parent | next [-] | |||||||||||||||||||||||||||||||
I've studied and worked in computer security for over a decade and have never heard of an "eclipse attack" before. Is this blockchain specific terminology? It seems like an adversarial network partition? | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||
▲ | 9 days ago | parent | prev [-] | |||||||||||||||||||||||||||||||
[deleted] |