On Mon, Jan 5, 2015 at 2:17 PM, Michael Rogers wrote:
> To be clear, are you suggesting that each relay and each client should
> pick some relays from the consensus and exchange chaff with them, and
> clients should also exchange chaff with their guards?
I'm saying you definitely have to have you
Hello,
Below is the log. Am I missing some package or something?
[1:07:53][~][1] $ sudo pip install ooniprobe
zsh: correct 'pip' to '.pip' [nyae]? n
Downloading/unpacking ooniprobe
Downloading ooniprobe-1.2.2.tar.gz (13.4MB): 13.4MB downloaded
Running setup.py (path:/tmp/pip-build-YH9MXT/ooni
The "compat.h" is needed due to the use of 'OP_EQ', etc:
diff --git a/src/ext/tinytest_demo.c b/src/ext/tinytest_demo.c
index c07f099..cfb524b 100644
--- a/src/ext/tinytest_demo.c
+++ b/src/ext/tinytest_demo.c
@@ -30,6 +30,7 @@
/* Make sure you include these headers. */
#include "tinytest.h"
#
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/01/15 20:16, Daniel Forster wrote:
> Hello Guys,
>
> it would be great if I could get a few opinions regarding my
> upcoming master thesis topic.
>
> My supervisor is Andriy Panchenko (you may know some of his work
> from Mike Perry's critique
Daniel Forster:
> Hello Guys,
>
> it would be great if I could get a few opinions regarding my
> upcoming master thesis topic.
>
> My supervisor is Andriy Panchenko (you may know some of his work
> from Mike Perry's critique on website fingerprinting attacks).
> As a defense, we'd like to experim
Hello Guys,
it would be great if I could get a few opinions regarding my upcoming
master thesis topic.
My supervisor is Andriy Panchenko (you may know some of his work from
Mike Perry's critique on website fingerprinting attacks).
As a defense, we'd like to experiment with traffic splitting (