Hi, coderman wrote (03 May 2015 03:37:17 GMT) : > a friend and i are working on a Tor router design that doesn't > compromise anonymity for convenience. [0][1][2][3][4]
Thanks! > please provide feedback in reply on this thread or to me directly.[6] Just to clarify, the threat model explicitly doesn't include "Attacker is able to reconfigure Tor on a client system to use an arbitrary set of bridges", right? Cheers, -- intrigeri _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev