https://blog.uproxy.org/2016/09/uproxy-adds-tor-support.html
This blog post says that uProxy gained support for proxying others'
traffic through Tor.
uProxy client → censor → uProxy server → Tor → destination
In the classic uProxy deployment scenario, the client and server are
people who know
> Well done, this looks really neat! A couple of questions:
Thanks Jesse :)
> 1) Are you looking into publishing your work in a peer-reviewed journal
> such as CSS, NDSS, PoPETS, or elsewhere?
Not at the moment, however there's another research group investigating QUIC
and I've also shared my
On 09/30/2016 07:02 AM, Ali Clark wrote:
> For my master's thesis this summer I looked into the performance impact from
> using QUIC instead of TCP/TLS as the relay transport. Results from the
> experiments look quite promising.
>
> For more details and the thesis, please see my blog post:
>
Greetings, again.
No it's not good enough if TCP is being layered on top of TCP.
Otherwise... then yes it should be good enough. I've previously
used it with mosh which uses UDP.
Changing the subject a bit, isn't The Internet of Things
going to lead to a situation where there are even more
Hi all,
For my master's thesis this summer I looked into the performance impact from
using QUIC instead of TCP/TLS as the relay transport. Results from the
experiments look quite promising.
For more details and the thesis, please see my blog post:
Allow me to second that - for some applications (Internet of Things being
the one I'm working on), the volume of data exchanged is very small, so
there isn't much chance for packets to be lost or retransmitted. OnionCat +
Tor simplify development immensely by giving each node a fixed IPv6
address,