On 3/17/19 8:18 PM, Ryan Duff wrote:
Hi again,
On Sun, Mar 17, 2019 at 7:40 PM teor <teor@riseup.net mailto:teor@riseup.net> wrote:
Most sites block by IP (or IP range), so a direct connection using the exit node's IP should give you very similar results to a Tor circuit using the exit node's IP.
Thanks teor! The point still stand though even though my solution to it is flawed. The thing being measured will be friendliness towards the Tor Browser instead of Tor overall. Basically, the measurement will be "friendly to Tor but not the Tor Browser". If that's the intent, then there is no real issue. I don't know how many sites will render for a Tor exit node but also only have issues with the Tor Browser itself but I'm definitely interested in seeing that data.
Yes, I should be clear about this. I am interested in the issues related to the Tor Browser, since the network level issues are already very well studied. For this project, only the Tor Browser is being considered.
I suppose, then, that I should call it the "Tor Browser Friendliness Scanner," but I didn't give that much thought to the name. Sorry about that!
- Kevin
-Ryan