On Sun, Feb 26, 2012 at 01:30:25PM -0500, Xinwen Fu wrote:
> Hi Chris,
>
> On Sun, Feb 26, 2012 at 12:09 PM, Chris Wheeler wrote:
>
> > Dr Fu,
> >
> > About the paper you sent, particularly the section on the simulation
> > using continuous-time mix, by the looks of it much of your degradation c
On Sun, Feb 26, 2012 at 8:36 PM, Chris Wheeler wrote:
> I imagine that you would only need to reorder packets end-to-end since
> those are the points on the network where
> a correlation attack compromises identity. If the packets being sent from a
> public web server on the internet travel throu
I imagine that you would only need to reorder packets end-to-end since
those are the points on the network where
a correlation attack compromises identity. If the packets being sent from a
public web server on the internet travel through the tor network in
a different order than they were seen ente
Is it still advisable for users of bridges to host hidden services?
Especially for private obfuscated bridges. The bridge users have only a
limited number of non-blocked bridge IP addresses.
And if the bridge is compromised, isn't the the risk for de-anonymizing
the hidden service higher?
__
Sorry, TCP over TCP is believed not a good idea in terms of performance.
On Sun, Feb 26, 2012 at 1:30 PM, Xinwen Fu wrote:
> Hi Chris,
>
> On Sun, Feb 26, 2012 at 12:09 PM, Chris Wheeler wrote:
>
>> Dr Fu,
>>
>> About the paper you sent, particularly the section on the simulation
>> using con
Hi Chris,
On Sun, Feb 26, 2012 at 12:09 PM, Chris Wheeler wrote:
> Dr Fu,
>
> About the paper you sent, particularly the section on the simulation
> using continuous-time mix, by the looks of it much of your degradation came
> from packets arriving in the wrong order. I know the TCP doesn't hand
that looks good but this is mac osx!
--
Jerzy Łogiewa -- jerz...@interia.eu
On Feb 26, 2012, at 12:57 PM, Chris Wheeler wrote:
> You can use freecap with your application.
> http://www.freecap.ru/eng/?p=download
>
> On Sun, Feb 26, 2012 at 12:08 PM, Jerzy Łogiewa wrote:
>
>> mail.app i the on
You can use freecap with your application.
http://www.freecap.ru/eng/?p=download
On Sun, Feb 26, 2012 at 12:08 PM, Jerzy Łogiewa wrote:
> mail.app i the one I use, and it is sad that it does not support its own
> proxy; it must be system-wide. :(
>
> this is why i ask.
>
> --
> Jerzy Łogiewa --
Dr Fu,
About the paper you sent, particularly the section on the simulation
using continuous-time mix, by the looks of it much of your degradation came
from packets arriving in the wrong order. I know the TCP doesn't handle
this well natively but what if a wrapper was written? The TCP stream would
mail.app i the one I use, and it is sad that it does not support its own proxy;
it must be system-wide. :(
this is why i ask.
--
Jerzy Łogiewa -- jerz...@interia.eu
On Feb 25, 2012, at 8:45 PM, Chris Wheeler wrote:
> This would be application specific. From the looks of it you are trying to
>
i would like to direct specific ports 995 and 465 to tor across system, instead
of using a global http/socks5 proxy for 'catch all'.
is privoxy/polipo the right tool for this? is proxytunnel useful also? i know
this is not a proxy howto list but can someone help or teach me to make some
spec
On 2012-02-26, Anne Magarey wrote:
> Please, what does this mean, and can I do something about it?
>
> It is in the tor Iran obfsproxy bridge log file. I had to turn off my
> computer and on reboot have this repeatedly in the file. It's been
> waiting for ~45 minutes so far.
>> [warn] Got a certif
12 matches
Mail list logo