[tor-dev] Tor Friendliness Scanner

Kevin Gallagher kcg295 at nyu.edu
Mon Mar 18 16:08:29 UTC 2019


On 3/17/19 8:18 PM, Ryan Duff wrote:
> Hi again,
>
> On Sun, Mar 17, 2019 at 7:40 PM teor <teor at riseup.net 
> <mailto:teor at riseup.net>> wrote:
>
>
>     Most sites block by IP (or IP range), so a direct connection using the
>     exit node's IP should give you very similar results to a Tor circuit
>     using the exit node's IP.
>
>
> Thanks teor! The point still stand though even though my solution to 
> it is flawed. The thing being measured will be friendliness towards 
> the Tor Browser instead of Tor overall. Basically, the measurement 
> will be "friendly to Tor but not the Tor Browser". If that's the 
> intent, then there is no real issue. I don't know how many sites will 
> render for a Tor exit node but also only have issues with the Tor 
> Browser itself but I'm definitely interested in seeing that data.


Yes, I should be clear about this. I am interested in the issues related 
to the Tor Browser, since the network level issues are already very well 
studied. For this project, only the Tor Browser is being considered.

I suppose, then, that I should call it the "Tor Browser Friendliness 
Scanner," but I didn't give that much thought to the name. Sorry about that!

- Kevin

>
> -Ryan
>
-- 
Kevin Gallagher
Ph.D. Candidate
Center For Cybersecurity
NYU Tandon School of Engineering
Key Fingerprint: D02B 25CB 0F7D E276 06C3  BF08 53E4 C50F 8247 4861

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20190318/9665d6fc/attachment.html>


More information about the tor-dev mailing list