[tor-dev] Tor Friendliness Scanner

teor teor at riseup.net
Sun Mar 17 23:39:41 UTC 2019


> On 17 Mar 2019, at 08:04, Ryan Duff <ry at nduff.com> wrote:
>> The way we intended to do this was to send our FF "ground-truth"
>> collection through Tor, and specifically through the same exit node as
>> TTB uses. This way we can isolate the variable to the differences in the
>> browsers, rather than any network or other concerns. In addition, we are
>> working on developing a method for determining if content is dynamically
>> generated (and therefore different every time), or broken.
> Won't this severely taint your "ground-truth" though? If you're ultimately using the exit-node for both, then you'll really only end up measuring what is friendly to the Tor Browser itself instead of Tor overall. Is that the goal?
> If not, with direct access to an exit node, you could run the test direct from that node (not using Tor) for the "ground truth" and then use it as the exit node of choice for the Tor Browser to have a solid comparison between Tor vs Not-Tor.

Most sites block by IP (or IP range), so a direct connection using the
exit node's IP should give you very similar results to a Tor circuit
using the exit node's IP.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20190318/a6b98efe/attachment.sig>

More information about the tor-dev mailing list