On 3/17/19 8:18 PM, Ryan Duff wrote:
Hi again,
On Sun, Mar 17, 2019 at 7:40 PM teor <t...@riseup.net
<mailto:t...@riseup.net>> wrote:
Most sites block by IP (or IP range), so a direct connection using the
exit node's IP should give you very similar results to a Tor circuit
using the exit node's IP.
Thanks teor! The point still stand though even though my solution to
it is flawed. The thing being measured will be friendliness towards
the Tor Browser instead of Tor overall. Basically, the measurement
will be "friendly to Tor but not the Tor Browser". If that's the
intent, then there is no real issue. I don't know how many sites will
render for a Tor exit node but also only have issues with the Tor
Browser itself but I'm definitely interested in seeing that data.
Yes, I should be clear about this. I am interested in the issues related
to the Tor Browser, since the network level issues are already very well
studied. For this project, only the Tor Browser is being considered.
I suppose, then, that I should call it the "Tor Browser Friendliness
Scanner," but I didn't give that much thought to the name. Sorry about that!
- Kevin
-Ryan
--
Kevin Gallagher
Ph.D. Candidate
Center For Cybersecurity
NYU Tandon School of Engineering
Key Fingerprint: D02B 25CB 0F7D E276 06C3 BF08 53E4 C50F 8247 4861
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev