On 22/02/14 04:08, David Fifield wrote:
> 2. Run a second browser, apart from Tor Browser, that receives commands
> from a client PT program and makes the HTTPS requests it is
> commanded to.
You might want to look at MozRepl. More summary here:
https://lists.torproject.org/pipermail/tor
On 2014-02-22 21:36, David Fifield wrote:
>> 2. Run a second browser, apart from Tor Browser, that receives commands
>> from a client PT program and makes the HTTPS requests it is
>> commanded to.
[..]
If all is well, there should be a paper at PETS2014 which solves exactly
th
On Sat, Feb 22, 2014 at 05:47:55PM +, Arlo Breault wrote:
> It seems the right thing to do is mimic a browser, and I can think of at
> least three ways to do that:
> 1. Try really hard, using NSS or some other library, to look like a
> particular browser.
> 2. Run a se
I was thinking that a generalized mechanism for using vpns as
obfsproxy transports would help solve for a dns transport... since a
dns transport is going to use a tun device. Perhaps
obfsproxy/network/launch_transport.py can be changed so that it has a
vpn role... where it sets up the tun device an
>
> It seems the right thing to do is mimic a browser, and I can think of at
> least three ways to do that:
> 1. Try really hard, using NSS or some other library, to look like a
> particular browser.
> 2. Run a second browser, apart from Tor Browser, that receives commands
> from a client