Here is a paper of mine on TCP Performance in Flow-Based Mix Networks:
http://www.cs.uml.edu/~xinwenfu/paper/MixPerf_Fu.pdf.
If you are interested in why Tor performance is still not super, you an
refer to http://www.cs.uml.edu/~xinwenfu/paper/IPDPS08_Fu.pdf.
There are many other brilliant works
This would be application specific. From the looks of it you are trying to
set up an email client to use tor. To do that you would need to have an
email client that supports SOCKS proxies. Most do I think. Just set up your
mail client like you normally would if you were not using tor and then in
th
That is a lot of thinking. Many of the problems have been discussed before.
If you look at the bibliography on mixes, there are a lot of discussions.
Here is one of my papers on mixes:
http://www.cs.uml.edu/~xinwenfu/paper/fu_icdcs05.pdf. An adversary may
choose different ways for correlation and a
hello,
i would like to direct specific ports 995 and 465 to tor across system, instead
of using a global http/socks5 proxy for 'catch all'.
is privoxy/polipo the right tool for this? is proxytunnel useful also? i know
this is not a proxy howto list but can someone help or teach me to make some
Please, what does this mean, and can I do something about it?
It is in the tor Iran obfsproxy bridge log file. I had to turn off my
computer and on reboot have this repeatedly in the file. It's been
waiting for ~45 minutes so far.
[warn] Got a certificate for dizum, but we already have it. Mayb
On 2/25/2012 3:23 PM, Chris Wheeler wrote:
Joe, I don't think that the order that the packet are sent
and received from the exit relay really changes the ease of correlation,
since they will arrive to the other end of the network in the same order.
1st, thanks for reply. You misunderstood (I thi
Joe, I don't think that the order that the packet are sent
and received from the exit relay really changes the ease of correlation,
since they will arrive to the other end of the network in the same order.
But maybe the middle relay could be the one who re-arranges the packets.
Delaying some and ex
On 2/25/2012 12:41 PM, Xinwen Fu wrote:
Chris,
An attack may only work under its own threat model (capabilities and
resources an adversary has). If entries and exit are all secure, some
correlation attacks may not work. However, if the adversary can still
observe (not need to compromise Tor rout
Chris,
An attack may only work under its own threat model (capabilities and
resources an adversary has). If entries and exit are all secure, some
correlation attacks may not work. However, if the adversary can still
observe (not need to compromise Tor routers) the traffic into and out of
entries a
Chris Wheeler, 25.02.2012 18:06:
> I have been reading a lot about end-to-end correlation attacks on tor. I am
> writing a paper on the subject and have a question which I can't seem to
> find an answer to. I understand these attacks rely on the attacker being
> able to view the traffic of the firs
I have been reading a lot about end-to-end correlation attacks on tor. I am
writing a paper on the subject and have a question which I can't seem to
find an answer to. I understand these attacks rely on the attacker being
able to view the traffic of the first relay a client is connecting to and
the
On Wed, Feb 22, 2012 at 03:24:01AM -, pro...@tormail.net wrote 0.7K bytes
in 18 lines about:
: Nowadays with Iran and the DPI, wouldn't it make sense to think again
: about stenography?
See https://www.torproject.org/projects/obfsproxy.html.en
--
Andrew
http://tpo.is/contact
pgp 0x74ED336B
Thanks. I've found my way, & asked the question there as you suggest.
On 2/25/2012 6:38 AM, Robert Ransom wrote:
> Please open a Trac ticket.
>
> On 2012-02-25, eliaz wrote:
>> [TBB -7.1 on Vista x64] When I overwrite log notice in torrc to warn, I
>> get only info lines, no others. My reading o
On 24.02.2012 15:03, Andreas Krey wrote:
>> Have you tried this using the actual dictionaries that you want us to
>> use? Are the resulting addresses really memorable?
>
> goric-edema-Alces-rune-pan-coost
> feign-crig-plane-tret-balli-chela
Please consider that not everyone's native language
It seems that there are some mistakes,Like SocksPolicy reject *:*,waht about
SocksPolicy accept *:*
At 2012-02-23 04:53:24,"Christian Kujau" wrote:
>Hi,
>
>I'm running a Tor bridge for some days now (after shutting down an exit
>node, due to too many DMCA complaints) but it's hardly getting any
Please open a Trac ticket.
On 2012-02-25, eliaz wrote:
> [TBB -7.1 on Vista x64] When I overwrite log notice in torrc to warn, I
> get only info lines, no others. My reading of the manual is that with
> log warn I should get only warn & err lines. Am I missing something or
> is this a bug?
>
Where all the other sensitive files are, and updated as needed. I'm do
see how the dictionary scheme might be helpful in some instances, though
for some users it might be another complication. But I'm no expert in
these matters, just a user.
On 2/25/2012 4:12 AM, Ahmed Hassan wrote:
> and store th
On Sat, Feb 25, 2012 at 06:34:02AM -0500, eliaz wrote:
> Where all the other sensitive files are, and updated as needed. I'm do
> see how the dictionary scheme might be helpful in some instances, though
> for some users it might be another complication. But I'm no expert in
> these matters, just a
OK, here are some real examples I got from a dictionary that has a 67843
words. I collected most of the words from the Bible and Gutenberg
project.
I used Python to convert to decimal from base 32.
DuckDuckGo
3g2upl4pq6kufc4m.onion = cowboys-slipt-pisanio-utgar-spinnt.onion
Official Tor packag
On Sat, Feb 25, 2012 at 04:09:24AM -0500, eliaz wrote:
>
> Why not just collect onion addresses in an encrypted file? ...
You might want to look up how they did things before DNS
was invented.
P.S. You're top-posting.
> On 2/24/2012 5:36 AM, Ahmed Hassan wrote:
> > Hello Folks,
> >
> > I have
[TBB -7.1 on Vista x64] When I overwrite log notice in torrc to warn, I
get only info lines, no others. My reading of the manual is that with
log warn I should get only warn & err lines. Am I missing something or
is this a bug?
___
tor-talk mailing list
t
and store that file where?
How that encrypted file will be updated?
On Sat, 2012-02-25 at 04:09 -0500, eliaz wrote:
> Why not just collect onion addresses in an encrypted file? ...
>
> On 2/24/2012 5:36 AM, Ahmed Hassan wrote:
> > Hello Folks,
> >
> > I have a cool idea to make onion addresses m
Why not just collect onion addresses in an encrypted file? ...
On 2/24/2012 5:36 AM, Ahmed Hassan wrote:
> Hello Folks,
>
> I have a cool idea to make onion addresses memorable. That will have no
> effect on its authenticity and security.
[snip]
___
to
Thanks so much.
在 2012-02-25 05:27:33,"Andrew Lewman" 写道:
>On Thu, 23 Feb 2012 22:01:22 +0800 (CST)
>刚毅之男 wrote:
>
>> Hello,i'm anovice that i get the knowledge that china has reject the
>> tor network,so does it mean that it's useless to be a tor bridge in
>> china?
>
>Yes. Your bridge will not
24 matches
Mail list logo