This is not a proposal.
So, since some people in this list, who are not in IRC, seemed
interested in censorship resistance, I pose this new question: What
should Tor bridges and clients do when they hosed in previous schemes?
All those previous proposals dealed with ways to detect fingerprinting
"Nick Mathewson" wrote:
I can't merge this one because we're trying to minimize drift between
Libevent's evdns.c and Tor's eventdns.c. Once we (eventually) require
libevent 2.0, we can just throw out our own eventdns.c .
I cannot see that my use of set_socket_nonblocking() and network_init(