On 6/28/14, Mark McCarron <mark.mccar...@live.co.uk> wrote:
> We also need to consider that some unidentified flaws exist in the code, but
> I agree with you traffic analysis is certainly the major problem at present.
>  Traffic obfuscation will not work against the NSA and it would cause
> problems with the network.
>
> The only option is to offer hosting within the Tor network itself.  Such
> hosting would need to be fragmented/distributed, or we could be exposing Tor
> providers to prosecution.  That is, pages and backend access are delivered
> by composing them from multiple random nodes.  It would probably best to
> start with Nginx or Apache and then modify it.  That's a complex design, but
> robust and the traffic analysis would yield little-to-no actionable
> information.

Read the freehaven papers.

Then write a paper.

Ask specific questions if you need.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to