
3 May
2015
3 May
'15
8:05 a.m.
Hi, coderman wrote (03 May 2015 03:37:17 GMT) :
a friend and i are working on a Tor router design that doesn't compromise anonymity for convenience. [0][1][2][3][4]
Thanks!
please provide feedback in reply on this thread or to me directly.[6]
Just to clarify, the threat model explicitly doesn't include "Attacker is able to reconfigure Tor on a client system to use an arbitrary set of bridges", right? Cheers, -- intrigeri