For that I'd suggest you look into running a separated test network with all nodes having TestingTorNetwork 1 in their torrc. Then you can change the hop number in the source & experiment away, without impacting the real network.
Regards, /peter
On 2018-05-24 10:30, dave` dave wrote:
I don't have something specific to hide, i just wonder how can i set more or less node for testing- im running all the nodes(Bridge,Guard, middle and exit) and i wanna know if I'm define for example one node the traffic will be encrypt or not?(if i can define a one node only) or adding more nodes.
On Tue, May 22, 2018 at 5:47 AM, grarpamp grarpamp@gmail.com wrote:
Paths are driven by the client and unchecked, it's not hard to do. However first you're better off taking a serious look at your threat model, which you've not mentioned at all for anyone to help you qualify it and any potential solutions therein, before turning random knobs in whatever anonymous overlays you're using.
Likely more useful than hop count would be analysis of the real world node network, with path selection leanings and choices being made therein. But again, no one seems to be taking up and working that project. Sybils all the way down... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays