> I've read the entire FAQ page! :)
> ...
> reasoning: in order to get the server response back to me, the encrypted
> packet Tor sends over the network, should contain and identifier of my Tor
> client. This way the .onion service can read the request, prepare a response
> and send it back to me.
Il 21.06.2013 09:37 grarpamp ha scritto:
At the level of the resultant TCP tunnel (at the application layer,
through
an exit or to an onion) all real IP's are effectively anonymized. Tor
uses
a mix of PKI, DH, EC, etc in extending its paths and so on. Your
question involves that, ie: does yo
The Parrot is Dead:
Observing Unobservable Network Communications
http://www.cs.utexas.edu/~shmat/abstracts.html
http://dedis.cs.yale.edu/2010/anon/papers/parrot-abs
I found this paper a very interesting read that discusses various pluggable
transports and other methods of obscuring Tor traf
Hi Asa,
You might like http://freehaven.net/anonbib/ . It also lists the Dead
Parrot Paper.
--
Moritz Bartl
https://www.torservers.net/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-ta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20 Jun 2013, at 04:26, strange-island wrote:
> In the photo on this page http://www.cl.cam.ac.uk/~sjm217/, Dr. Murdoch
> is pictured standing in front of a much nattier version of Vidalia than
> the one that ships with the stable browser bundles.
I disagree with the Tor Project pushing for a StackExchange that is limited to
Tor, when a StackExchange for Anonymity Technology doesn't exist as a whole. I
would prefer that a SE for Anonymity software is established that includes Tor
as well as other solutions such as I2P. As it stands right
On Fri, Jun 21, 2013 at 8:58 AM, Nadim Kobeissi wrote:
> I disagree with the Tor Project pushing for a StackExchange that is limited
> to Tor, when a StackExchange for Anonymity Technology doesn't exist as a
> whole. I would prefer that a SE for Anonymity software is established that
> includes
On Fri, Jun 21, 2013 at 12:58 PM, Nadim Kobeissi wrote:
> I disagree with the Tor Project pushing for a StackExchange that is limited
> to Tor, when a StackExchange for Anonymity Technology doesn't exist as a
> whole. I would prefer that a SE for Anonymity software is established that
> include
Runa A. Sandvik:
> On Fri, Jun 21, 2013 at 12:58 PM, Nadim Kobeissi wrote:
>> I disagree with the Tor Project pushing for a StackExchange that is limited
>> to Tor, when a StackExchange for Anonymity Technology doesn't exist as a
>> whole. I would prefer that a SE for Anonymity software is estab
On Fri, Jun 21, 2013, at 10:05 AM, NoWhereMan wrote:
> Il 21.06.2013 09:37 grarpamp ha scritto:
>
> >
> > At the level of the resultant TCP tunnel (at the application layer,
> > through
> > an exit or to an onion) all real IP's are effectively anonymized. Tor
> > uses
> > a mix of PKI, DH, EC
On Fri, Jun 21, 2013 at 2:39 PM, adrelanos wrote:
> Runa A. Sandvik:
>> On Fri, Jun 21, 2013 at 12:58 PM, Nadim Kobeissi wrote:
>>> I disagree with the Tor Project pushing for a StackExchange that is limited
>>> to Tor, when a StackExchange for Anonymity Technology doesn't exist as a
>>> whole.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20-Jun-13 5:26 AM, strange-island wrote:
> In the photo on this page http://www.cl.cam.ac.uk/~sjm217/, Dr.
> Murdoch is pictured standing in front of a much nattier version of
> Vidalia than the one that ships with the stable browser bundles.
> The
On Fri, Jun 21, 2013 at 2:33 AM, Asa Rossoff wrote:
> ...
> I found this paper a very interesting read that discusses various pluggable
> transports and other methods of obscuring Tor traffic, and even contends
> that all the existing "parrot" sysem that try to mimic Skype, VOIP, and HTML
> traffi
On 21.06.2013 20:52, coderman wrote:
> i'm interested in Blanu's "dust", which will be presented at DEF CON:
> "Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine"
> https://www.defcon.org/html/defcon-21/dc-21-speakers.html
> is there any technical information about dust ahead
Aw snap, that's me. The papers that I have out now are about Dust v1, which
provides randomization across connection properties to avoid
classification. The Defcon presentation (no paper yet) is about Dust v2,
which shapes connection properties to force classification of traffic into
a desired cate
On Fri, Jun 21, 2013 at 12:05 PM, Moritz Bartl wrote:
> ...
> http://freehaven.net/anonbib/#wileydust ?
Thanks Moritz!
The paper
http://blanu.net/Dust.pdf
has a link to what I was looking for:
https://github.com/blanu/Dust
___
tor-talk mailing list
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Everyone,
The first ever BSides Winnipeg currently has its CFP open and would
like to invite anyone who is interested in speaking to submit!
If you are interested in submitting, please see
http://bsideswpg.ca/cfp.html for further details. I am a
17 matches
Mail list logo