[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Tor Friendliness Scanner



On 3/17/19 8:18 PM, Ryan Duff wrote:
Hi again,

On Sun, Mar 17, 2019 at 7:40 PM teor <teor@xxxxxxxxxx> wrote:

Most sites block by IP (or IP range), so a direct connection using the
exit node's IP should give you very similar results to a Tor circuit
using the exit node's IP.

Thanks teor! The point still stand though even though my solution to it is flawed. The thing being measured will be friendliness towards the Tor Browser instead of Tor overall. Basically, the measurement will be "friendly to Tor but not the Tor Browser". If that's the intent, then there is no real issue. I don't know how many sites will render for a Tor exit node but also only have issues with the Tor Browser itself but I'm definitely interested in seeing that data.


Yes, I should be clear about this. I am interested in the issues related to the Tor Browser, since the network level issues are already very well studied. For this project, only the Tor Browser is being considered.

I suppose, then, that I should call it the "Tor Browser Friendliness Scanner," but I didn't give that much thought to the name. Sorry about that!

- Kevin


-Ryan

-- 
Kevin Gallagher
Ph.D. Candidate
Center For Cybersecurity
NYU Tandon School of Engineering
Key Fingerprint: D02B 25CB 0F7D E276 06C3  BF08 53E4 C50F 8247 4861 
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev