David Fifield: > Have you ever wondered what makes the Tor protocol fingerprintable, and > makes pluggable transports necessary? Have you wondered how obfs3 > obscures byte patterns in Tor? What a flash proxy WebSocket connection > actually looks like, and why it defeats IP blocking but not DPI? > > Then I have the wiki page for you: > > https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports > > It's a visualization of different pluggable transports, meant to be an > aid to understanding. At the top is an ordinary Tor handshake, with some > fingerprintable data fields highlighted. The following sections, one for > each transport, show how those fields are hidden--or not. I tried to > demonstrate aspects of different transports that I think are hard to > intuit, such as what flash proxy rendezvous looks like, and how > transports look under the encrypted layer that is visible to a censor. This is a beautiful and helpful piece of work. Thank you! -- Lunar <lunar@xxxxxxxxxxxxxx>
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev