Hi folks,

For those who are interested, a group of security/usability academics we
know did a nice analysis of the state of Tor installation/configuration
approaches as of about a year ago:
http://cups.cs.cmu.edu/soups/2007/proceedings/p41_clark.pdf

The link is from:
http://cups.cs.cmu.edu/soups/2007/program.html

If anybody wants to grab ahold of the suggestions in the paper and turn
them into more concrete patches, please do. :)

Enjoy,
--Roger

Reply via email to