[tor-dev] Building better pluggable transports (Google Summer of Code)
adrelanos at riseup.net
Tue May 28 18:51:48 UTC 2013
How good are SSH connections with hiding what's inside?
Website fingerprinting has demonstrated, that SSH connections may hide
communication contents, but which website was visited, could be guessed
with a fairly good results.
Tor isn't a website, but if SSH leaks which website has been visited
even when using a SSH tunnel, will it also leak the fact, that someone
is using Tor through a SSH tunnel?
More information about the tor-dev