Hi Chang,
On 29 May 2013, at 06:22, Chang Lan changl...@gmail.com wrote:
Given that ScrambleSuite is being deployed, improving protocol obfuscation
will be my main focus. HTTP impersonation is really useful, since there are
numerous HTTP proxy outside the censored region, while the number of
Damian, thanks. Your summary pretty well sums up where i am trying to start. I
will try this out and go from there.
On Jun 10, 2013, at 11:08 PM, Damian Johnson ata...@torproject.org wrote:
Hi Sarah. I'm not really sure what you're trying to ask in most of
these questions. Assuming that your
I can try experimenting with this later on (when we have the full / needed
importer working, e.g.), but it might be difficult to scale indeed (not
sure, of course). Do you have any specific use cases in mind? (actually
curious, could be interesting to hear.)
The advantages of being able to
On 6/10/13 4:40 AM, Karsten Loesing wrote:
On 6/6/13 7:32 PM, Norman Danner wrote:
I have two questions regarding a possible research project.
First, the research question: can one use machine-learning techniques
to construct a model of Tor client behavior? Or in a more general form:
On Tue, Jun 11, 2013 at 05:46:49PM +0100, Steven Murdoch wrote:
On 11 Jun 2013, at 12:49, Steven Murdoch [1]steven.murd...@cl.cam.ac.uk
wrote:
There certainly are quite a few open questions, so it would be good to
start planning early. Implementing HTTP is a deceptively difficult
On 11 Jun 2013, at 12:49, Steven Murdoch steven.murd...@cl.cam.ac.uk wrote:
There certainly are quite a few open questions, so it would be good to start
planning early. Implementing HTTP is a deceptively difficult project.
I've started a design document
I've been thinking about writing a lessons-learned document about
StegoTorus; I'll bump that up a little on the todo queue.
For right now I want to mention that any greenfields design should
take a hard look at MinimaLT
http://cr.yp.to/tcpip/minimalt-20130522.pdf as its cryptographic
layer. It