> On Feb 16, 2015, at 5:43 AM, Florian Rüchel
> wrote:
>
>>> It would also help me a lot if you can direct me to papers or articles
>>> that have shown specific attacks that are known to work on the current
>>> network.
You might want to look into the Sniper Attack as an example of how to eval
Hi,
> Yes, I'm also wondering whether the anonymity of low-latency Tor would
> increase if we plugged a high-latency network into it, and also the
> opposite. I'm curious on whether one network will act as cover traffic
> for the other, and what kind of adversaries that would fool.
>
> On this to
On Sun, Feb 08, 2015 at 11:49:57PM +0200, s7r wrote:
[snip]
> >
> > On this topic you might also enjoy the paper "Sleeping dogs lie on
> > a bed of onions but wake when mixed" by Paul Syverson:
> > https://petsymposium.org/2011/papers/hotpets11-final10Syverson.pdf
> >
>
> Nice paper. Wonder wh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2/8/2015 11:39 PM, George Kadianakis wrote:
> Florian Rüchel writes:
>
>> Hi everyone,
>>
>> I have taken some time and considered my topic for the Master's
>> Thesis. I have finally decided to write it on integrating
>> high-latency traffi
Florian Rüchel writes:
> Hi everyone,
>
> I have taken some time and considered my topic for the Master's Thesis.
> I have finally decided to write it on integrating high-latency traffic
> with the Tor low-latency network (see also my initial mail and George's
> response[1]).
>
Hello,
yes it d
Hi everyone,
I have taken some time and considered my topic for the Master's Thesis.
I have finally decided to write it on integrating high-latency traffic
with the Tor low-latency network (see also my initial mail and George's
response[1]).
My primary research goal is to determine the impact of