[tor-talk] Tor identification Research
gk at torproject.org
Wed Jul 16 18:55:13 UTC 2014
> Hi All,
> I'm doing some research on Tor identification, and it seems that Tor recently implemented different type of defenses by enabling HTTP pipelining, padding, and packet relaying and randomizing the pipeline size as well as the order of requests. which one of these are implemented and which are not ?
You mean you are looking for implemented defenses against website
traffic fingerprinting? In this case have a look at:
And, above all, see at the actual code and the commit message:
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the tor-talk