Hi Karsten. I'm starting to look into remote descriptor fetching, a
capability of metrics-lib that stem presently lacks [1][2]. The spec
says that mirrors provide zlib compressed data [3], and the
DirectoryDownloader handles this via a InflaterInputStream [4].
So far, so good. By my read of the ma
Hi Kostas. Now that we no longer need to worry about accidentally
leaking GSoC selection we can talk more openly about your project.
Below is an interchange between me and Karsten - thoughts?
-- Forwarded message --
From: Karsten Loesing
Date: Thu, May 23, 2013 at 11:37 AM
Subject
On Mon, May 27, 2013 at 11:39:06AM -0700, Micah Lee wrote:
> Would it be fair to say that using the techniques published in this
> paper an attacker can deanonymize a hidden service?
Yes, if you're willing to sustain the attack for months.
But actually, this Oakland paper you're looking at is a m
On 05/23/2013 07:18 PM, Tom Ritter wrote:
> RPW's, et al's paper was made public today, and demonstrates several
> practical attacks on Hidden Services.
> http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
>
> I was wondering if there were any private trac tickets, discussions,
> or develo