Marc Juarez:
I think website fingerprinting is one of the most threatening attacks to
Tor because it can be deployed with moderate resources and the
information that can be extracted as a result is highly sensitive (e.g.,
browsing history). It basically defeats one of the main privacy
irregula...@riseup.net writes:
Hello people,
I'm investigating how may we combine the traffic obfuscation provided by
obfsproxy+scramblesuit with OpenVPN instead of Tor.
I completely understand how this combination does not provide anonymity,
but nevertheless I think it will be of some
Hi,
I've been directed to this email address by Matt in regards to volunteering
for the project. Currently I work as a consultant that specialises in
providing hosted services to my clients. I am a keen learner of technology
and have learnt (mostly self taught) various languages (C/C++,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Lunar:
Have you read Mike Perry's long blog post on the topic?
https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
It outlines future research work in evaluating the efficiency of
fingerprinting attacks, and also
On 3/10/14, 11:23 PM, David Fifield wrote:
I started trying to write a Firefox extension that makes HTTP requests
outside of the proxy settings. I have one that works in Iceweasel 24.3
and does the Host header trick used by the transport. However it doesn't
work in Tor Browser, and I'm looking