Hi Marc,
your plans for the wfpadtools framework sound really interesting.
An evaluation framework of website fingerprinting defenses would be really
useful! I would be happy to use it to evaluate the splitting/padding approach.
Like you and Mike said, I have to implement the splitting in Tor fir
On Jan 7, 2015, at 9:13 PM, Mike Perry wrote:
> I think regardless of our current entry guard choice (which is governed
> by the consensus and subject to relatively easy change, btw), having a
> datapoint on how traffic splitting affects Website Traffic
> Fingerprinting accuracy would be a very
Daniel Forster wrote:
> Hello Guys,
>
> it would be great if I could get a few opinions regarding my
> upcoming master thesis topic.
>
> My supervisor is Andriy Panchenko (you may know some of his work
> from Mike Perry's critique on website fingerprinting attacks).
> As a defense, we'd like to exp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/01/15 20:16, Daniel Forster wrote:
> Hello Guys,
>
> it would be great if I could get a few opinions regarding my
> upcoming master thesis topic.
>
> My supervisor is Andriy Panchenko (you may know some of his work
> from Mike Perry's critique
Daniel Forster:
> Hello Guys,
>
> it would be great if I could get a few opinions regarding my
> upcoming master thesis topic.
>
> My supervisor is Andriy Panchenko (you may know some of his work
> from Mike Perry's critique on website fingerprinting attacks).
> As a defense, we'd like to experim
Hello Guys,
it would be great if I could get a few opinions regarding my upcoming
master thesis topic.
My supervisor is Andriy Panchenko (you may know some of his work from
Mike Perry's critique on website fingerprinting attacks).
As a defense, we'd like to experiment with traffic splitting (