[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: DDoS attacks via TOR?
On Thu, November 6, 2008 14:31, Paul Syverson wrote:
> You uncaffeinated clod ;>)
> I think you mean the introduction points. The rendezous point
> is chosen by the client, not the hidden server.
Hey, I've said I was undercaffeinated!
> Apologies if this isn't what you meant, but you may be thinking of my
> paper with Lasse Overlier, "Valet Services: Improving Hidden Servers
> with a Personal Touch" from PETS 2006 and available at
> http://freehaven.net/anonbib/ or
yes, that was the issue and the provided links are very useful. Not the
file I was looking for but great links nevertheless. thanks!
BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
My webstuff: http://sidbox.homelinux.org/
My GnuPG key id: 0x86A91047