[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #3914 [Tor Browser]: Experimental Website fingerprinting defense



#3914: Experimental Website fingerprinting defense
---------------------------------------------+------------------------------
 Reporter:  mikeperry                        |          Owner:  mikeperry
     Type:  enhancement                      |         Status:  new      
 Priority:  normal                           |      Milestone:           
Component:  Tor Browser                      |        Version:           
 Keywords:  MikePerryIterationFires20110911  |         Parent:           
   Points:                                   |   Actualpoints:           
---------------------------------------------+------------------------------

Comment(by mikeperry):

 The patch will have two parameters, which I am going to just hardcode in
 for now, but if anyone shows any interest in testing various values I can
 pretty easily convert them to about:config prefs.

 maxrequests - the maximum number of requests to put into a pipeline
 minrequests - the minimum number of requests to put into a pipeline

 These are set right now to 12 and 4, respectively. There is a uniform
 distribution among the queue sizes between these two values. The request
 ordering should be randomized amongst all currently pending requests on a
 connection.

 There are routinely enough requests to create 12-request pipelines. It is
 possible we could raise this value much higher (though there is a static
 compiled-in limit).

 I think this one stands a decent chance of working with the right
 parameters, if the torified HTTP pipeline ends up behaving like I expect
 on the wire. But I could be wrong?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3914#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs