> I have done some work myself on understanding and trying to counter > endpoint eavesdroppers in both theory > "More Anonymous Onion Routing Through Trust" > www.cs.utexas.edu/~ajohnson/publications/trusted_sets-csf09.pdf > and practice > "AS-awareness in Tor Path Selection" > http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf
More things to consider when constructing paths... http://www.freelists.org/post/torservers/Rokabear-Icelandic-Hosting-for-Tor,8 _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk