[tor-talk] Tor identification Research

Georg Koppen gk at torproject.org
Wed Jul 16 18:55:13 UTC 2014

alaa mub:
> Hi All,
> I'm doing some research on Tor identification, and it seems that Tor recently implemented different type of defenses by enabling HTTP pipelining, padding, and packet relaying and randomizing the pipeline size as well as the order of requests. which one of these are implemented and which are not ? 

You mean you are looking for implemented defenses against website
traffic fingerprinting? In this case have a look at:



And, above all, see at the actual code and the commit message:



> Thanks 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140716/a5566a57/attachment.sig>

More information about the tor-talk mailing list