[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Prototype Primitives for Website Traffic Fingerprinting defenses



Mike Perry:
> I've inserted a couple of corrections and clarifications below. I'm
> leaving original text fully quoted for the archive.
>
> [nah. *snip*]

I've converted this text and a few other clarifications and additions
into something that more closely resembles a Tor proposal.

It now lives at:
https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/refs/heads/multihop-padding-primitives:/proposals/ideas/xxx-multihop-padding-primitives.txt

I'm really rather excited about the Adaptive Padding primitives in
particular, especially with our extensions to the original idea. I think
it has a lot of promise to be extremely effective, tunable, and flexible
as a traffic fingerprinting defense.

Those of you who know just how crazy^Wambitious I am also know that I
think it will actually impede end-to-end correlation as well (at least,
for short-lived/bursty web-like traffic). But we'll cross that bridge
when it starts burning. First, let's put this traffic fingerprinting
problem out of its misery :)

-- 
Mike Perry

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev