I didn't write the paper for this list specifically. It requires
performing DDoS attacks. Your the one trolling someone in reality. I am
not going to go out of my way to spend time when realistically its quite
simple to perform. If you don't want to use NTP, and other factors to
performing
> I'm not presenting a scientific paper. Its an actual method that works.
You must learn how to articulate the idea without muddling it with all kinds
of other irrelevant stuff. Nobody mentioned scientific papers. Are you saying
that you don't read papers describing attacks on Tor? They are
re: grarpamp
I am writing a possible countermeasure which uses transactional requests.
You submit entire requests which are processed by the exit node. Several
other situations can take place while routing to the exit node. It would
also only require exit nodes to have updated to the newer
I'm not presenting a scientific paper. Its an actual method that works.
You can DDoS various networks to compare against active connections on TOR,
and otherwise...
On Mon, Apr 10, 2017 at 12:22 PM, dawuud wrote:
>
>
> Dear Mike Guidry,
>
> My reply here is snarky but I
On Mon, 10 Apr 2017 19:35:24 +0400
meejah wrote:
> Obviously as per my other post I agree with fragmented / limited views
> given to "real" applications of the control-port. However, personally
> I don't see the point of implementing this in 'tor' itself -- existing
>
hella old news. oh look here's POC for end to end correlation
https://var.thejh.net/git/?p=detour.git;a=blob;f=README
but why bother chatting about this since it's explicitly not
in Tor's threat model to protect against a global passive adversary?
if you want to protect against that then look
re: "tcp_tracing_internet.pdf"
This appears to describe an active network modulation attack (node DoS).
Either hammer tree on nodes of the expected path and trace the modulation,
or on all but the expected path to find unmodulated.
It generally requires GPA, deploying nodes, or being one end of
Dear Mike Guidry,
My reply here is snarky but I just cannot help it. Please consider me
a friend that is snarky rather than an enemy or an asshole.
I am finding it very hard to read. It is *extremely* annoying that you
present your definition of "hacking" at the beginning and then go on to
anonym writes:
>> It allows "GETINFO onions/current", which can expose a list of every
>> onion service locally hosted, even those not launched through
>> onionshare.
> I think this can be disallowed; in fact, when looking at the
> onionshare and stem sources I don't see why
I am not trolling you. I attached a PDF which explains how to trace TOR
connections over the internet. It is not a joke. I have some other
vulnerabilities at that URL I am releasing.
I'll include here:
Michael Guidry March 15, 2017
Tracing connections online from the virtual landscape to the
Nick Mathewson:
> Hi!
>
> As you may know, the Tor control port assumes that if you can
> authenticate to it, you are completely trusted with respect to the Tor
> instance you have authenticated to. But there are a few programs and
> tools that filter access to the Tor control port, in an
Hello,
> Is the project 'Feedback Extension for Tor Browser' still a part of GSoC
> 2017? I have already submitted a proposal and would like to work on it.
> Please help.
Yes, it is still a part of GSoC. We will let you know if we have any questions
or if there is any feedback on the proposal
12 matches
Mail list logo