[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-project] Constructing a real-world dataset for studying website fingerprinting



> On Apr 24, 2023, at 6:40 PM, Tobias Pulls <tobias.pulls@xxxxxx> wrote:
> 
> More refined labeling please!
> 

Understood. We’ll consider your feedback and see if we might be able to safely produce more informative labels.

> It's not a replacement for implementations and real-defended datasets though, I hope we can agree on?
[snip]
> We want more implemented and ultimately deployed defenses, right?

I absolutely agree!

Our dataset might be more immediately useful for evaluating attacks, but I don’t see how it hurts our ability to evaluate defenses. Defenses should still be implemented and evaluated in network-wide tests as before [0]. The best way I know how to do that is to first use Shadow for full network testing of a variety of candidate defenses before moving the best to the live Tor network. And I think our dataset could help make the Shadow part more realistic.

Peace, love, and positivity,
Rob

[0] "Padding-only Defenses Add Delay in Tor”
https://www-users.cse.umn.edu/~hoppernj/padding_delay_wpes.pdf


_______________________________________________
tor-project mailing list
tor-project@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-project