On 11/28/14, Mansour Moufid <[email protected]> wrote: > ... > They implemented new traffic confirmation attacks that cannot be > detected by the end points, based on some radar techniques. They > don't mention it but the attacks can be implemented in real time. > > They can also decrease the false positive rate by increasing the > bandwidth of the DSSS chip. A patient enough attacker can have no > false positives.
a multi-path wide socket datagram based stochastically re-ordered and shaped transport overlay with optimized dependent link padding would keep such a coding recoverable confirmation in the dark, indefinitely. [citation needed] -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
