Here's a proposal describing some padding negotiation cell primitives that
should be useful to defend against website traffic fingerprinting, hidden
service circuit fingerprinting, and probably just about any other traffic
analysis attack under the sun.
The proposal is in my git remote at:
https:/
> On 10 Sep 2015, at 17:01, isis wrote:
>
> Hey all,
>
> I have a working implementation of proposal #188, [0] which specifies a
> mechanism by which tor's (rather accidental) loose-source routing feature is
> utilised by Bridges in order to transparently inject a Bridge Guard into all
> client