and exits, some attacks may still work, e.g., by correlating the
traffic patterns at the two sides of a circuit. Here is a paper describing
such possibility:
http://www.cs.uml.edu/~xinwenfu/paper/TorCellSize_ICC11_Fu.pdf.
Hope it helps a bit.
Xinwen Fu
On Sat, Feb 25, 2012 at 12:06 PM, Chris
mance Tor
relies on. TCP is very sensitive to packet ordering errors.
Indeed, there are still a lot of things we don't know for sure. However, at
least Tor is over there and you can test it on the real one or a private
Tor.
Cheers,
Xinwen Fu
On Sat, Feb 25, 2012 at 3:49 PM, Joe Btfs
on the performance problem.
Cheers,
Xinwen Fu
On Sat, Feb 25, 2012 at 9:31 PM, Xinwen Fu wrote:
> That is a lot of thinking. Many of the problems have been discussed
> before. If you look at the bibliography on mixes, there are a lot of
> discussions. Here is one of my papers on mixe
on is how you set the overall rate of the padded traffic? You
can refer to early papers on padding by my group and Matthew Wright at UT
Arlington.
Cheers,
Xinwen Fu
> What do you think?
> Chris
>
> On Sat, Feb 25, 2012 at 9:49 PM, Xinwen Fu wrote:
>
> > Here is a p
Sorry, TCP over TCP is believed not a good idea in terms of performance.
On Sun, Feb 26, 2012 at 1:30 PM, Xinwen Fu wrote:
> Hi Chris,
>
> On Sun, Feb 26, 2012 at 12:09 PM, Chris Wheeler wrote:
>
>> Dr Fu,
>>
>> About the paper you sent, particularly the sect
raffic rate as
features correlating flows. You can refer to them.
Hope it helps a bit.
Xinwen Fu
> I think that could work. What do you think?
>
> On Sun, Feb 26, 2012 at 1:31 PM, Xinwen Fu wrote:
>
> > Sorry, TCP over TCP is believed not a good idea in terms of performan
This paper may help http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf.
Xinwen Fu
On Sun, May 6, 2012 at 5:07 AM, eliaz wrote:
> Of what use is a bridge working off an IP address of a provider located
> in, say, the US, to a client in, say, Syria? Sorry for the elementary
> questi
the behavior of
the operators? Is there any legal liability?
Xinwen Fu
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
laws.
What if somebody attacks my computer running a Tor exit via Tor? I have to
call police since I cannot check the content of the attack traffic?
Xinwen Fu
On Sun, Oct 23, 2011 at 8:51 PM, Gregory Maxwell wrote:
> On Sun, Oct 23, 2011 at 8:42 PM, Xinwen Fu wrote:
> > I'm a bit cur
Thanks for the information, guys. I'm teaching a digital forensics class and
trying to clean up these tangling laws.
Xinwen Fu
On Sun, Oct 23, 2011 at 10:56 PM, Roger Dingledine wrote:
> On Sun, Oct 23, 2011 at 10:18:41PM -0400, Xinwen Fu wrote:
> > I'm just asking the
Sent from Fu's iPhone
> On Dec 21, 2016, at 12:59 PM, Allen wrote:
>
> I have a question about the privacy of hidden services. Let's say I
> create a tor hidden service and privately send the onion address to
> only two other people. Would anyone outside of myself and those two
> people be a
11 matches
Mail list logo