On 03/17/2015 15:20, coderman wrote:
i use cyclops to monitor BGP routes of interest. it would be
interesting to automate monitoring of routes for routers in consensus
automatically via script rather than fixed configuration through
cyclops UI.http://cyclops.cs.ucla.edu/
if anyone is aware of su
On 3/16/15, Kevin wrote:
> ...
> If such attacks are network wide, is there anything the end-user can do
> to keep themselves safe? Does tor need special configuration?
i use cyclops to monitor BGP routes of interest. it would be
interesting to automate monitoring of routes for routers in consen
On 3/16/2015 7:26 PM, grarpamp wrote:
http://arxiv.org/abs/1503.03940
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer
Rexford, Mung Chiang, Prateek Mittal
(Submitted on 13 Mar 2015)
The Tor network is a widely used system for anonymous communication.
However, Tor is known to be
http://arxiv.org/abs/1503.03940
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer
Rexford, Mung Chiang, Prateek Mittal
(Submitted on 13 Mar 2015)
The Tor network is a widely used system for anonymous communication.
However, Tor is known to be vulnerable to attackers who can observe