I'm putting together a proposal for adding anonymous blocklisting into the
Tor such that websites that block Tor can block single problematic users
instead of all Tor exit nodes.
Towards this end, I am looking for papers/prior work in this area to draw
from. Pointers anyone?
Enjoyed the Iceland
On Sun, Feb 23, 2014 at 07:46:55AM +, Virgil Griffith wrote:
I'm putting together a proposal for adding anonymous blocklisting into the
Tor such that websites that block Tor can block single problematic users
instead of all Tor exit nodes.
Towards this end, I am looking for papers/prior
Hi,
Its Devang here, a coding enthusiast studying at IIT Bombay. I am
looking forward to contribute to Tor for the upcoming Google Summer of Code
2014 as a prospective student. So I wanted to know if there was a provision
for Web Scraping using Tor. If there is, I would to know more about
On 02/22/2014 08:54 PM, Ximin Luo wrote:
On 22/02/14 04:08, David Fifield wrote:
2. Run a second browser, apart from Tor Browser, that receives
commands from a client PT program and makes the HTTPS requests it
is commanded to.
You might want to look at MozRepl. More summary here:
Hi Devang, glad you want to take part in GSoC! We don't know yet if
Google has selected us this year - they'll be announcing org selection
tomorrow.
I'm not very clear on what you're proposing to do over the summer. In
case it helps we have GSoC project ideas on...
Hello David and George and other people who are interested in there being even
more obfuscation transports for tor, I appreciate the thought of making a
frankenstein butchering of obfsproxy code which transports tor over dns... and
speaks socks and tor control port... and works to PT spec...
We technically don't need to use a tun device for the dns transport... but if a
tun device is used for the tor dns transport then we get the reliability layer
without having to write it ourselves. It doesn't matter that tun devices are
lossy and udp is unreliable; we just spray packets.