[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] tor-talk Digest, Vol 77, Issue 11
Thank Toy very much for your response.
Regarding the Tor's source code I have many questions:
1- how can I download the latest stable release. I found the link for
source code bust I couldn't figure out which is the latest and how to
download the latest release.
2- Is there any detailed documentation for Tor's source code in order to
understand it and be able to maintain it.
3- Is the Tor plug-in used with Shadow simulator updated and implementing
all processes done by Tor.
Thanks,
Suhaib Mbarak
On 9 June 2017 at 07:00, <tor-talk-request@xxxxxxxxxxxxxxxxxxxx> wrote:
> Send tor-talk mailing list submissions to
> tor-talk@xxxxxxxxxxxxxxxxxxxx
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> or, via email, send a message with subject or body 'help' to
> tor-talk-request@xxxxxxxxxxxxxxxxxxxx
>
> You can reach the person managing the list at
> tor-talk-owner@xxxxxxxxxxxxxxxxxxxx
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-talk digest..."
>
>
> Today's Topics:
>
> 1. Re: tor-talk Digest, Vol 77, Issue 9 (Seth David Schoen)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 8 Jun 2017 16:59:40 -0700
> From: Seth David Schoen <schoen@xxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] tor-talk Digest, Vol 77, Issue 9
> Message-ID: <20170608235940.GI2963@demorgan>
> Content-Type: text/plain; charset=us-ascii
>
> Suhaib Mbarak writes:
>
> > I'm a master student and doing some researches on TOR . I'm using shadow
> > simulator; not real tor network; my goal is only to run an experiment and
> > from the output of that experiment I can confess my students that Tor
> > really : [...]
>
> It seems to me that one useful possibility is to modify the Tor client so
> that it outputs logs of the decisions it makes and the actions it takes,
> as well as, maybe, the cryptographic secrets that it uses. For example,
> your modified Tor client could print out how it chose a path, and the
> actions that it took to build the path, and the actual encryption keys
> that it used in communicating with the nodes along the path.
>
> You could then also use a packet sniffer (or some mechanism for packet
> capture if your network is totally virtual) to examine the actual
> traffic in your simulated network, and, for example, to decrypt it using
> the keys that were logged by the modified client, showing exactly what
> information can be seen by someone in possession of each secret key, and
> conversely which keys are necessary in order to learn which information.
>
> --
> Seth Schoen <schoen@xxxxxxx>
> Senior Staff Technologist https://www.eff.org/
> Electronic Frontier Foundation https://www.eff.org/join
> 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
> ------------------------------
>
> End of tor-talk Digest, Vol 77, Issue 11
> ****************************************
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk