> On Feb 16, 2015, at 5:43 AM, Florian Rüchel > <florian.ruechel....@inexplicity.de> wrote: > >>> It would also help me a lot if you can direct me to papers or articles >>> that have shown specific attacks that are known to work on the current >>> network.
You might want to look into the Sniper Attack as an example of how to evaluate attacks on Tor safely using Shadow: http://www.robgjansen.com/publications/sniper-ndss2014.pdf For those wanting to follow the Shadow thread on this topic, that starts here: http://mailman.cs.umn.edu/archives/shadow-support/2015-February/000312.html Best regards, Rob _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev