Hi tor guys,
encrypted traffic analysis is an analysis apply to an encrypted session
in order not to disclose the protected data, but to detect the protocol
protected.
the IRAN attack in TOR was, more or less, an attack like them. (more or
less because was based on the HTTPS pattern, not in an
On 5/17/11 11:12 AM, vecna wrote:
Hi tor guys,
encrypted traffic analysis is an analysis apply to an encrypted session
in order not to disclose the protected data, but to detect the protocol
protected.
COOL
1) try a blocked TOR version in IRAN, to verify if the session is
protected
I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12. I received
the following error message when trying to access
www.stcharlessingers.com. I was able to access the site when I used
TorButton to bypass Tor with my Firefox 4.0.1 browser
The following error occurred while trying to access
On Tue, 17 May 2011 13:51:42 -0500
David Carlson carlson...@sbcglobal.net wrote:
I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12. I received
the following error message when trying to access
www.stcharlessingers.com. I was able to access the site when I used
TorButton to bypass Tor
How can I use the KiXtart scripting laguage to change identities ?
DDE ?
COM Automation ?
--
Dave
Multi-AV Scanning Tool - http://www.pctipp.ch/downloads/dl/35905.asp
___
tor-talk mailing list
tor-talk@lists.torproject.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Brandon Wiley wrote:
This is
an interesting method of obfuscation as it seems like it would interfere to
some extent with the three most popular DPI techniques: string matching,
packet lengths, and packet timings. However, like most obfuscation