[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: DDoS attacks via TOR?

On Thu, November 6, 2008 14:31, Paul Syverson wrote:
> You uncaffeinated clod ;>)

> I think you mean the introduction points. The rendezous point
> is chosen by the client, not the hidden server.
Hey, I've said I was undercaffeinated!

> Apologies if this isn't what you meant, but you may be thinking of my
> paper with Lasse Overlier, "Valet Services: Improving Hidden Servers
> with a Personal Touch" from PETS 2006 and available at
> http://freehaven.net/anonbib/ or
> http://www.onion-router.net/Publications.html
yes, that was the issue and the provided links are very useful. Not the
file I was looking for but great links nevertheless. thanks!


Marco Bonetti
BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
My webstuff: http://sidbox.homelinux.org/

My GnuPG key id: 0x86A91047