[tor-dev] Tor Friendliness Scanner
kcg295 at nyu.edu
Mon Mar 18 16:08:29 UTC 2019
On 3/17/19 8:18 PM, Ryan Duff wrote:
> Hi again,
> On Sun, Mar 17, 2019 at 7:40 PM teor <teor at riseup.net
> <mailto:teor at riseup.net>> wrote:
> Most sites block by IP (or IP range), so a direct connection using the
> exit node's IP should give you very similar results to a Tor circuit
> using the exit node's IP.
> Thanks teor! The point still stand though even though my solution to
> it is flawed. The thing being measured will be friendliness towards
> the Tor Browser instead of Tor overall. Basically, the measurement
> will be "friendly to Tor but not the Tor Browser". If that's the
> intent, then there is no real issue. I don't know how many sites will
> render for a Tor exit node but also only have issues with the Tor
> Browser itself but I'm definitely interested in seeing that data.
Yes, I should be clear about this. I am interested in the issues related
to the Tor Browser, since the network level issues are already very well
studied. For this project, only the Tor Browser is being considered.
I suppose, then, that I should call it the "Tor Browser Friendliness
Scanner," but I didn't give that much thought to the name. Sorry about that!
Center For Cybersecurity
NYU Tandon School of Engineering
Key Fingerprint: D02B 25CB 0F7D E276 06C3 BF08 53E4 C50F 8247 4861
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the tor-dev