David Fifield:
> Have you ever wondered what makes the Tor protocol fingerprintable, and
> makes pluggable transports necessary? Have you wondered how obfs3
> obscures byte patterns in Tor? What a flash proxy WebSocket connection
> actually looks like, and why it defeats IP blocking but not DPI?
> 
> Then I have the wiki page for you:
> 
> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
> 
> It's a visualization of different pluggable transports, meant to be an
> aid to understanding. At the top is an ordinary Tor handshake, with some
> fingerprintable data fields highlighted. The following sections, one for
> each transport, show how those fields are hidden--or not. I tried to
> demonstrate aspects of different transports that I think are hard to
> intuit, such as what flash proxy rendezvous looks like, and how
> transports look under the encrypted layer that is visible to a censor.

This is a beautiful and helpful piece of work. Thank you!

-- 
Lunar                                             <lu...@torproject.org>

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to