> I'm not presenting a scientific paper. Its an actual method that works. You must learn how to articulate the idea without muddling it with all kinds of other irrelevant stuff. Nobody mentioned scientific papers. Are you saying that you don't read papers describing attacks on Tor? They are really fun to read. > You can DDoS various networks to compare against active connections on TOR, > and otherwise... What are the assumptions of the attack? What kind of capabilities must an attacker have?
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev