[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Building better pluggable transports (Google Summer of Code)



How good are SSH connections with hiding what's inside?

Website fingerprinting has demonstrated, that SSH connections may hide
communication contents, but which website was visited, could be guessed
with a fairly good results.

Tor isn't a website, but if SSH leaks which website has been visited
even when using a SSH tunnel, will it also leak the fact, that someone
is using Tor through a SSH tunnel?
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev