I would recommend the BeagleBone Black. It's only $10 more than the Pi and
it runs actual Debian and the tor development debs work out of the box.
It's also has a 1GHz processor and 512MB RAM. My uptime is 45 days right
now.
My bandwidth settings (below) allows for an always-on relay that doesn
Gordon,
Thanks.
>> To see if it was possible just now I set up an obfsproxy bridge as
>> best I could but it failed to download properly.
I reinstalled Ubuntu 11.10 64 and free -m brought this..
total used free sharedbuffers cached
Mem: 256
On Wed, Oct 23, 2013 at 1:26 PM, Aaron Hopkins wrote:
> On Wed, 23 Oct 2013, Karsten Loesing wrote:
>
>> Basically the experiment does traceroutes to three groups: all
>> "routable IP prefixes", all Tor relays, and then all /24 subnets.
>
>
> Based on my read of your input data, these will run tra
On Wed, 23 Oct 2013, Karsten Loesing wrote:
As you may be aware, the anonymity of a connection over Tor is vulnerable
to an adversary who can observe it in enough places along its route.
Are you trying to work backward to physical-layer chokepoints, like how the
inter-contentinal network topol
On 10/23/2013 10:09 AM, Karsten Loesing wrote:
> Hello Tor relay operators,
>
> We could use your help in a pilot project to improve Tor security. As
> you may be aware, the anonymity of a connection over Tor is vulnerable
> to an adversary who can observe it in enough places along its route.
> For
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Tor relay operators,
We could use your help in a pilot project to improve Tor security. As
you may be aware, the anonymity of a connection over Tor is vulnerable
to an adversary who can observe it in enough places along its route.
For example, t