Protecting bridge operators from probing attacks
Although Tor was originally designed to enhance privacy, the network is increasingly being used...
Although Tor was originally designed to enhance privacy, the network is increasingly being used...
Greetings! My name is Tim Wilde, Software Engineer at Team Cymru, Inc., and a big fan of the Tor...
Once we get more (and more diverse) bridge addresses, the next research step is that we'll need...
While we're exploring smarter ways of getting more bridge addresses, and while the bridge arms...
There are two recent stories claiming the Tor network is compromised. It seems it is easier to...
As more anonymous communications and PETs researchers join the academic ranks, there is an...
The August 2011 Progress Report is here,...
Updated 09/05/2011: Add link to actual implementation patch on gitweb Website fingerprinting is...
Tor's entry guard design protects users in a variety of ways. First, they protect against the...
We need more bridges. When I first envisioned the bridge address arms race, I said "We need to...