On Wed, Jul 19, 2017 at 04:39:41PM -0500, eric gisse wrote:
> Looking at the exitmap source, as I was curious what modules
> existedthe problem I see is that it does not have modules that are
> capable of the more difficult to pull off things like SSH honeypot
> detection.
The Tor Project main
Ooh, fascinating.
The academic paper is interesting and covers the high points of the
type of things you would want to look for. And some things you
wouldn't think that you should, like connection sampling rather than
binary "is sniffing" / "is not sniffing". (ha ha, n^2 fuckup)
Looking at th
On Wed, Jul 19, 2017 at 01:43:32PM -0500, eric gisse wrote:
> Is there any notion of doing a sort of automated testing for things
> like this that can be easily proven?
Yes, the blog post I linked to contains some more information. We are
using tools such as exitmap [1] to systematically scan the