[tor-dev] Prototype Primitives for Website Traffic Fingerprinting defenses
Mike Perry
mikeperry at torproject.org
Thu Aug 28 03:57:05 UTC 2014
Mike Perry:
> I've inserted a couple of corrections and clarifications below. I'm
> leaving original text fully quoted for the archive.
>
> [nah. *snip*]
I've converted this text and a few other clarifications and additions
into something that more closely resembles a Tor proposal.
It now lives at:
https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/refs/heads/multihop-padding-primitives:/proposals/ideas/xxx-multihop-padding-primitives.txt
I'm really rather excited about the Adaptive Padding primitives in
particular, especially with our extensions to the original idea. I think
it has a lot of promise to be extremely effective, tunable, and flexible
as a traffic fingerprinting defense.
Those of you who know just how crazy^Wambitious I am also know that I
think it will actually impede end-to-end correlation as well (at least,
for short-lived/bursty web-like traffic). But we'll cross that bridge
when it starts burning. First, let's put this traffic fingerprinting
problem out of its misery :)
--
Mike Perry
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20140827/c2ab41df/attachment.sig>
More information about the tor-dev
mailing list