[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.



Toralf Förster via tor-relays wrote:
> On 9/24/24 15:40, boldsuck via tor-relays wrote:
> > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD
> > DZo6BQqwQURzjQy
> OT, but useless use of cat ;)

Oh, you're right. It's nicer because I have instance name in front of it.

grep bridge-ips /var/lib/tor-instances/*/stats/bridge-stats
/var/lib/tor-instances/45/stats/bridge-stats:bridge-ips

I still prefer to use cat for public pastebin. Less information is better. :-)

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays