Why can't it always be winter? With murderous weather keeping you indoors life
is so much more productive.
Hidden Service Descriptor Support
Hi Leeroy,
If I understand correctly, you are arguing that my assumption that
bittorrent is unlikely to be blocked is faulty. I don't have a strong
argument against this, other than that it would be a very drastic move
since for that part of the world bittorrent is the main way to get access
to me
Good point about joining the swarm. This is a part of the design that i'm
not confident about, it's definitely questionable.
Suppose a non-bitsmuggler peer joins the swarm. If he starts torrenting the
file, he will get a correct copy (no checksum fails on the pieces) of it
because all bitsmuggler
Hi,
I'm wondering about a particular case--let me explain. From your
threat model you assume that the adversary has suspicions about
encrypted traffic and may block them without strong justification. You
also take as given that the adversary may be state-level. From the
adversary objective this is
Also interesting is that BitTorrent has its own family of obfuscation
transports. I think they are designed to evade throttling by ISPs, which
is a threat model similar to the censorship one.
https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption
MSE (Message Stream Encryption) is a little
On Sat, Feb 28, 2015 at 10:46:03AM -0800, Dan Cristian Octavian wrote:
> My name is Dan, I've been working on a pluggable transport for Tor based on
> bittorrent as cover traffic and wanted to let you know about it.
>
> https://github.com/danoctavian/bit-smuggler
>
> In a nutshell, I'm tunnelling
Hi,
If I understand the factors, as things stand currently, regarding
family use with respect to the *security* of Tor.
Pros
1 - Prevents information disclosure in case of using related relay too
much (relay configuration or seizure of hardware).
Cons
2 - It's not used by operators with maliciou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I'm a Bitrig [0] user and have been slowly patching up gitian-builder
so that it knows how to create build VM's other than ubuntu [1]. I
haven't pushed all of my patches yet, but I have a version of
gitian-builder where make-base-vm understands "--o
Inspired by Gareth's 31C3 talk [0], I taught sybilhunter [1] to
calculate the amount of unique fingerprints a Tor relay used over time.
Armed with that feature, I extracted the top 10 relay IP addresses that
had the most fingerprints for every month since 2007 [2]. While most IP
addresses show up
Hi,
I have already shared my project idea on a Simple analytics tool
for Hidden service providers. I am looking for suggestions and input from
users who have had experience in hosting hidden services. Obviously, there
would all useful traffic related statistics. I'm looking for suggestions
Hello,
I would like to participate to the GSoC 2015 (my first one) and contribute to
the Tor project. I am registered as timide on the OFTC IRC network.
I am currently student in master of computer science, and working with LibFTE
for a school project.
Actually, fteproxy can be used as a Tor br
11 matches
Mail list logo