alaa mub:
> Hi All,
> 
> I'm doing some research on Tor identification, and it seems that Tor recently 
> implemented different type of defenses by enabling HTTP pipelining, padding, 
> and packet relaying and randomizing the pipeline size as well as the order of 
> requests. which one of these are implemented and which are not ? 

You mean you are looking for implemented defenses against website
traffic fingerprinting? In this case have a look at:

https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting

https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks

And, above all, see at the actual code and the commit message:

https://gitweb.torproject.org/tor-browser.git/commit/354b3b5d05c1cb83afdf2c8b3a8a321d89fd390c

Georg

> 
> Thanks 
> 


Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to