> Indeed, this would be pretty bad. I'm not convinced that moria1
> provides truncated responses though. It could also be that it
> compresses results for every new request and that compressed responses
> randomly differ in size, but are still valid compressions of the same
> input. Kostas, do y
A year ago or so, during FOCI '12, with the help of some smart people [0]
I compiled a list of interesting metrics/visualizations that could
help us understand the security of the Tor network.
Since even more people are interested in metrics lately, I thought of
posting this list here, in case it
On Sat, 08 Jun 2013 19:58:06 +0400
Nikita Karetnikov wrote:
> I've found out that TorDNSEL is in the public domain (see [1]).
The official Tordnsel will remain in the public domain. You're welcome
for fork it of course. However, if you want to commit back to us, please
don't change the licensin
On Sat, Jun 8, 2013 at 11:58 AM, Nikita Karetnikov
wrote:
>> There is exactly one such program:
>> https://www.torproject.org/tordnsel/dist/
>
>> On the bright side (for you, not for us) TorBEL never replaced it. We
>> still use TorDNSEL to generate the exit-addresses files:
>> https://exitlist.to
> There is exactly one such program:
> https://www.torproject.org/tordnsel/dist/
> On the bright side (for you, not for us) TorBEL never replaced it. We
> still use TorDNSEL to generate the exit-addresses files:
> https://exitlist.torproject.org/
I've found out that TorDNSEL is in the public doma
On Fri, Jun 07, 2013 at 07:38:44PM +0200, ra wrote:
> Hello everyone!
>
> During this year's Google Summer of Code I[0] will be working on reducing the
> Round-Trip-Time (RTT) for preemptively built circuits.[1] My mentors are Mike
> and Aaron.
>
> A brief summary of the project:
> RTTs of circ