, part of the team will be at the upcoming
[Internet Freedom Festival](https://internetfreedomfestival.org/) in
Valencia (6-10 March). If you plan to be there we'd love to chat with
you face to face.`:)`
Thank you very much for your help!
CENO team <https://lists.equalit.ie/mailman/listin
t; > doesn't mean that the censors in China have the capability to do the
> > kind of traffic analysis they describe (yet), but it's something for
> > us to keep in mind for the future. obfs4 and ScrambleSuit in fact
> > are already capable of obfuscating their traffic patterns, but the
> > capability hasn't been turned on yet because it hasn't been needed.
--
Ivan Vilata i Balaguer
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Flipchan (2017-02-20 23:41:15 +0100) wrote:
> Hi ! I have coded My own obfusication
> proxy(github.com/flipchan/layerprox) i would also recommend checking
> out scamblesuit, fte and obfs4
Thanks for the obfuscation pointers Flipchan!
> Ivan Vilata-i-Balaguer skrev: (20 februari 2
different
proxy than Tor? Is there some technical hurdle (i.e. some source code
modification) that would prevent it from working?
Thanks for your comments!
--
Ivan Vilata i Balaguer
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings g
Hi Georg, thanks for your reply! More inline.
Georg Koppen (2017-11-24 07:12:00 +) wrote:
> Ivan Vilata-i-Balaguer:
> >
> > […] Since the main entry point to the system will usually be a web proxy, we
> > were wondering whether it would make sense to use the Tor Bro