alaa mub: > Hi All, > > I'm doing some research on Tor identification, and it seems that Tor recently implemented different type of defenses by enabling HTTP pipelining, padding, and packet relaying and randomizing the pipeline size as well as the order of requests. which one of these are implemented and which are not ? You mean you are looking for implemented defenses against website traffic fingerprinting? In this case have a look at: https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks And, above all, see at the actual code and the commit message: https://gitweb.torproject.org/tor-browser.git/commit/354b3b5d05c1cb83afdf2c8b3a8a321d89fd390c Georg > > Thanks >
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk