Hi,
> As for the deanonymization attack, I think it is pretty novel in that it
> uses a custom traffic signature to make the attack from
> http://freehaven.net/anonbib/cache/hs-attack06.pdf more reliable, but
> otherwise that is why we introduced guard nodes.
I'm still pretty sure this only makes
Hello,
I receive a daily digest, so I am replying to everything at once.
> http, https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt
>
> section 1 line 184 "All directory information is uploaded and
> downloaded with HTTP."
>
> If you search through the document for http, you will fi
Hello!
I have been reading through the various tor specifications trying to
understand how this all works, so please forgive any ignorance of the
protocol on my part. There seems to be a fair amount of gaps about
specifically how various communications take place; for instance if we
consider the v