Re: [tor-dev] "Trawling for Tor Hidden Services: Detection, [...]"

2013-05-23 Thread Jon Smithe
Hi, > As for the deanonymization attack, I think it is pretty novel in that it > uses a custom traffic signature to make the attack from > http://freehaven.net/anonbib/cache/hs-attack06.pdf more reliable, but > otherwise that is why we introduced guard nodes. I'm still pretty sure this only makes

Re: [tor-dev] Questions pertaining to client to directory authority

2013-05-19 Thread Jon Smithe
Hello, I receive a daily digest, so I am replying to everything at once. > http, https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt > > section 1 line 184 "All directory information is uploaded and > downloaded with HTTP." > > If you search through the document for http, you will fi

[tor-dev] Questions pertaining to client to directory authority communications

2013-05-19 Thread Jon Smithe
Hello! I have been reading through the various tor specifications trying to understand how this all works, so please forgive any ignorance of the protocol on my part. There seems to be a fair amount of gaps about specifically how various communications take place; for instance if we consider the v