[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor identification Research



alaa mub:
> Hi All,
> 
> I'm doing some research on Tor identification, and it seems that Tor recently implemented different type of defenses by enabling HTTP pipelining, padding, and packet relaying and randomizing the pipeline size as well as the order of requests. which one of these are implemented and which are not ? 

You mean you are looking for implemented defenses against website
traffic fingerprinting? In this case have a look at:

https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting

https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks

And, above all, see at the actual code and the commit message:

https://gitweb.torproject.org/tor-browser.git/commit/354b3b5d05c1cb83afdf2c8b3a8a321d89fd390c

Georg

> 
> Thanks 
> 


Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk