[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] passive analysis of encrypted traffic and traffic obfuscation
On 5/17/11 11:12 AM, vecna wrote:
> Hi tor guys,
>
> encrypted traffic analysis is an analysis apply to an encrypted session
> in order not to disclose the protected data, but to detect the protocol
> protected.
COOL!!!!
> 1) try a blocked TOR version in IRAN, to verify if the session is
> protected from the anti-TOR tech
That's what i asked some time ago to try your sniffjoke:
https://lists.torproject.org/pipermail/tor-talk/2011-March/019877.html
Some volunteer proporsed to provide a port-forwarding to exit from Iran,
but we would need 'raw socket' access to a linux machine to verify how
effectively sniffjoke bypass the Iranian Deep Packet Inspection Systems.
-naif
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk