I've barely had time to poke at this much, but it's really neat. I was
actually originally going to call "txtorcon" simply "txtor" but figured
I'd leave that name in case anyone wrote an actual Tor implementation as
a Twisted protocol -- which I guess you've now done :) [...and you're
welcome to t
Hi Damian,
Thanks for the reply!
> Your codebase mentions that you had trouble with the ExitPolicy's
> can_exit_to() when you omit an address. Could you please provide an
> example of a policy you were having trouble with and the expected
> behavior? From the docs and code it sounds like if you o
Hi Nik, very nice work! We love seeing alternative tor implementations
since it gives us the chance to test if specs are up to snuff (Orchid
is the only other one that comes to mind, but that has been inactive
since 2013 [1]). Personally I've been curious if we can shift core tor
to Python, Ruby, o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/01/15 14:40, Yawning Angel wrote:
> I believe most of BuFLO's shortcomings documented in Cai, X.,
> Nithyanand, R., Johnson R., "New Approaches to Website
> Fingerprinting Defenses" 5.A. apply to the currently proposed
> defense, though some
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/01/15 11:25, Mike Perry wrote:
> You might also like the "Adaptive Padding" defense:
> http://freehaven.net/anonbib/cache/ShWa-Timing06.pdf. It
> implements pretty much what you describe here. It is one of my
> current low-resource favorites.