On Fri, 19 Nov 2010, Theodore Bagwell wrote:
On Fri, 19 Nov 2010 08:11 -0500, Paul Syverson
syver...@itd.nrl.navy.mil wrote:
Your reactions are good. It's just that many people have had the
same reactions so we've explored this, and nobody in all of the research
done has yet produced a viable
On 11/18/2010 11:03 PM, Roger Dingledine wrote:
attack, which doesn't care how many hops your path has (as long
as it's at least two). You can read more about it from the various
freehaven.net/anonbib/ links in this blog post about a related topic:
On Fri, Nov 19, 2010 at 10:49:32AM -0500, Jonathan D. Proulx wrote:
On Fri, Nov 19, 2010 at 10:33:38AM -0500, Paul Syverson wrote:
:Better go have another espresso ;)
further through the coffee now and wishing if I had to have said thout
out loud I'd at least not sent from my MIT addresss
On Thu, Nov 18, 2010 at 06:19:03PM -0800, Theodore Bagwell wrote:
Some of you may be aware of the paper,Cyber Crime Scene Investigations
(C2SI) through Cloud Computing
(http://www.cs.uml.edu/~xinwenfu/paper/SPCC10_Fu.pdf) which illustrates
a feasible method of invalidating the anonymity
-Original Message-
From: Theodore Bagwell torus...@imap.cc
To: or-t...@seul.org
Sent: Fri, Nov 19, 2010 9:19 am
Subject: Anonymity easily thwarted by flooding network with relays?
Some of you may be aware of the paper,Cyber Crime Scene Investigations
C2SI) through Cloud Computing
5 matches
Mail list logo