On Thu, Feb 24, 2011 at 7:35 PM, wrote:
> Hey all,
>
> Security researcher here (as I assume are many of you).
> Papers and a book linked to from sig.
>
> Anyway, if I want to come up to speed on the security properties
> of tor, to the point of understanding how they're enforced and what
> isn't
Hey all,
Security researcher here (as I assume are many of you).
Papers and a book linked to from sig.
Anyway, if I want to come up to speed on the security properties
of tor, to the point of understanding how they're enforced and what
isn't an enforced security property, what's the suggested rea