Hi Divya,
Have you seen this yet? -
https://github.com/torproject/tor/blob/master/doc/HACKING/CircuitPaddingDevelopment.md
I suspect it would be substantially beneficial to your research.
-Ryan
@flyryan
On Mon, Mar 16, 2020 at 2:30 PM DIVYA GUPTA <2016ucp1...@mnit.ac.in> wrote:
> Hello,
>
> We
> If someone is going to criticize other people's work and dismiss it as
nearly useless without even somewhat informing themselves about it,
they should expect to be called out on that.
I don't have a dog in this fight but, as an outside observer, I never got
the impression that this is what Tom w
Hi again,
On Sun, Mar 17, 2019 at 7:40 PM teor wrote:
>
> Most sites block by IP (or IP range), so a direct connection using the
> exit node's IP should give you very similar results to a Tor circuit
> using the exit node's IP.
>
Thanks teor! The point still stand though even though my solution
Hi Kevin,
Really interesting project!
The way we intended to do this was to send our FF "ground-truth"
> collection through Tor, and specifically through the same exit node as
> TTB uses. This way we can isolate the variable to the differences in the
> browsers, rather than any network or other c
2 of the 3 options mentioned by Matthew were that...
On Thu, Jul 26, 2018 at 10:43 AM Nathaniel Suchy wrote:
> Perhaps the developers could make something like Tor Tails but stripped
> down bare bones to converse system resources with just Tor Browser
> afterwards packaging it all into a nice Vi
I'm always amazed at the demands people will make about free software.
On Sat, Jun 16, 2018 at 2:36 PM, Matt Traudt wrote:
>
>
> On 06/16/2018 12:01 PM, juanjo wrote:
> > I do not understand why Sandboxed Tor Browser is now deprecated when it
> > should be the new thing in security features. It