-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi devs,
I was reminded by Harmony that I said a while back [0] that I would
announce new Onionoo versions on this list and not only in private
message to Harmony for including them in the next TWN issue. Oops.
So, version 2.4 added a new
Hi, all!
Here's the schedule we worked out for the Tor 0.2.7 feature freeze.
(These are defaults, not promises. We can make exceptions, but please
remember that delaying a freeze will delay release, and every day we
delay a release will delay all the _other_ features getting out into a
stable
https://kpdyer.com/publications/ccs2015-measurement.pdf
They claim that they are able to detect obfs3, obfs4, FTE, and meek
using entropy analysis and machine learning.
I wonder if their dataset allows for such a conclusion. They use a
(admittedly, large) set of flow traces gathered at a
NB: quickly responding before I go to bed.
On Wed, 19 Aug 2015 14:13:03 -0400
Philipp Winter p...@nymity.ch wrote:
https://kpdyer.com/publications/ccs2015-measurement.pdf
They claim that they are able to detect obfs3, obfs4, FTE, and meek
using entropy analysis and machine learning.
Not
On 12/07/15 22:48, John Brooks wrote:
1.3. Other effects on proposal 224
An adversarial introduction point is not significantly more capable than a
hidden service directory under proposal 224. The differences are:
1. The introduction point maintains a long-lived circuit with the
Hi,
since a request to make bwauth output available has been closed as
wontfix previously [1] I'm not going to ask whether this data would be
added to CollecTor, but maybe bwauth ops are publishing it
'inofficially' (like Tom does [2]) for the dir auth to fetch already and
would be willing to