On Sat, Jul 14, 2018 at 8:30 PM Stephane Bortzmeyer
wrote:
> On Tue, Jul 03, 2018 at 06:18:51PM -0400,
> Ben Schwartz wrote
> a message of 293 lines which said:
>
> > My main question for the authors is: how does this compare to
> > routing a DNS-over-TLS socket through a TCP forwarder?
>
>
On Sat, Jul 14, 2018 at 09:13:56PM -0400,
Nick Feamster wrote
a message of 40 lines which said:
> 1. Tor is vulnerable to DNS fingerprinting, particularly at the
> recursive resolver. Many Tor exits use Google public DNS (~40%, by
> exit throughput),
I know this research but I don't see the
> On Jul 14, 2018, at 8:27 PM, Stephane Bortzmeyer wrote:
>
> On Tue, Jul 03, 2018 at 06:18:51PM -0400,
> Ben Schwartz wrote
> a message of 293 lines which said:
>
>> My main question for the authors is: how does this compare to
>> routing a DNS-over-TLS socket through a TCP forwarder?
>
On Tue, Jul 03, 2018 at 06:18:51PM -0400,
Ben Schwartz wrote
a message of 293 lines which said:
> My main question for the authors is: how does this compare to
> routing a DNS-over-TLS socket through a TCP forwarder?
Isn't it what Tor is doing? Reasons to use Tor:
* well known and studied,