On Tue, Mar 11, 2014 at 05:22:37PM -0400, Mark Smith wrote:
> On 3/10/14, 11:23 PM, David Fifield wrote:
> >I started trying to write a Firefox extension that makes HTTP requests
> >outside of the proxy settings. I have one that works in Iceweasel 24.3
> >and does the Host header trick used by the
On 3/10/14, 11:23 PM, David Fifield wrote:
I started trying to write a Firefox extension that makes HTTP requests
outside of the proxy settings. I have one that works in Iceweasel 24.3
and does the Host header trick used by the transport. However it doesn't
work in Tor Browser, and I'm looking fo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Lunar:
> Have you read Mike Perry's long blog post on the topic?
> https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
>
> It outlines future research work in evaluating the efficiency of
> fingerprinting attacks, and also
> Hi,
>
> I've been directed to this email address by Matt in regards to volunteering
> for the project. Currently I work as a consultant that specialises in
> providing hosted services to my clients. I am a keen learner of technology
> and have learnt (mostly self taught) various languages (C/C++,
irregula...@riseup.net writes:
> Hello people,
>
> I'm investigating how may we combine the traffic obfuscation provided by
> obfsproxy+scramblesuit with OpenVPN instead of Tor.
>
> I completely understand how this combination does not provide anonymity,
> but nevertheless I think it will be of so
Marc Juarez:
> I think website fingerprinting is one of the most threatening attacks to
> Tor because it can be deployed with moderate resources and the
> information that can be extracted as a result is highly sensitive (e.g.,
> browsing history). It basically defeats one of the main privacy
> gua