Hooman writes:
D) The morphing output is basically identical to the naive shaping. Are
you sure you did it right?
>>> So as mentioned in the report, the original traffic morphing does
>>> not consider timing at all (which makes it less effective against
>>> DPIs) and it aims at minimizi
On 12-03-28 02:28 AM, Roger Dingledine wrote:
On Mon, Mar 26, 2012 at 03:04:47PM -0400, Hooman wrote:
Can you give us some guesses about next steps for resolving these issues
(or explaining why they aren't actually as worrisome as they appear)?
A) It looks like the transport has no notion of ad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Erring on the side of "release early, release often" I have put my
Twisted-based (asynchronous, Python) Tor control protocol
implementation online:
http://readthedocs.org/docs/txtorcon/en/latest/
https://github.com/meejah/txtorcon
It is MIT lic