alaa mub: > Hi All, > > I'm doing some research on Tor identification, and it seems that Tor recently > implemented different type of defenses by enabling HTTP pipelining, padding, > and packet relaying and randomizing the pipeline size as well as the order of > requests. which one of these are implemented and which are not ?
You mean you are looking for implemented defenses against website traffic fingerprinting? In this case have a look at: https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks And, above all, see at the actual code and the commit message: https://gitweb.torproject.org/tor-browser.git/commit/354b3b5d05c1cb83afdf2c8b3a8a321d89fd390c Georg > > Thanks >
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
