On 5/8/2012 11:40 AM, Xinwen Fu wrote: > This paper may help http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf.
Thanks for the analysis, it's very useful. It raises some questions that the programmers may want to shed light on. Based upon my reading of the report, bridge usage greater than the norm can be due to bridge-harvesting as well as to an increase in legitimate traffic. Since the Bridge Usage Summary isn't in real time, there's no point in my changing the bridge address (rebooting gateway) when I see a bump in the Summary. But if I ran a dummy client on a different machine, would I be able to identify harvesters from the message logs? And would it be useful to then reassign the bridge address? The other thing and get from the report is that while the harvesters can identify bridges, they can't uncover the identity the clients using those bridges. Assuming that the routing algorithm keeps clients attached to bridges during a IP address change (that is, if it connects clients to bridge names rather than IP addresses), wouldn't it be useful for me to reassign my bridge address randomly, without trying to synchronize with the harvesters? - eli _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk