Hi,

coderman wrote (03 May 2015 03:37:17 GMT) :
> a friend and i are working on a Tor router design that doesn't
> compromise anonymity for convenience. [0][1][2][3][4]

Thanks!

> please provide feedback in reply on this thread or to me directly.[6]

Just to clarify, the threat model explicitly doesn't include "Attacker
is able to reconfigure Tor on a client system to use an arbitrary set
of bridges", right?

Cheers,
--
intrigeri
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to