[tor-talk] tor-talk Digest, Vol 77, Issue 11

Suhaib Mbarak suhaib.omari at gmail.com
Mon Jun 12 07:55:58 UTC 2017


Thank Toy very much for your response.

Regarding the Tor's source code I have many questions:

1- how can I download the latest stable release. I found the link for
source code bust I couldn't figure out which is the latest and how to
download the latest release.

2- Is there any detailed documentation for Tor's source code in order to
understand it and be able to maintain it.

3- Is the Tor plug-in used with Shadow simulator updated and implementing
all processes done by Tor.

Thanks,
Suhaib Mbarak

On 9 June 2017 at 07:00, <tor-talk-request at lists.torproject.org> wrote:

> Send tor-talk mailing list submissions to
>         tor-talk at lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> or, via email, send a message with subject or body 'help' to
>         tor-talk-request at lists.torproject.org
>
> You can reach the person managing the list at
>         tor-talk-owner at lists.torproject.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-talk digest..."
>
>
> Today's Topics:
>
>    1. Re: tor-talk Digest, Vol 77, Issue 9 (Seth David Schoen)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 8 Jun 2017 16:59:40 -0700
> From: Seth David Schoen <schoen at eff.org>
> To: tor-talk at lists.torproject.org
> Subject: Re: [tor-talk] tor-talk Digest, Vol 77, Issue 9
> Message-ID: <20170608235940.GI2963 at demorgan>
> Content-Type: text/plain; charset=us-ascii
>
> Suhaib Mbarak writes:
>
> > I'm a master student and doing some researches on TOR . I'm using shadow
> > simulator; not real tor network; my goal is only to run an experiment and
> > from the output of that experiment I can confess my students that Tor
> > really : [...]
>
> It seems to me that one useful possibility is to modify the Tor client so
> that it outputs logs of the decisions it makes and the actions it takes,
> as well as, maybe, the cryptographic secrets that it uses.  For example,
> your modified Tor client could print out how it chose a path, and the
> actions that it took to build the path, and the actual encryption keys
> that it used in communicating with the nodes along the path.
>
> You could then also use a packet sniffer (or some mechanism for packet
> capture if your network is totally virtual) to examine the actual
> traffic in your simulated network, and, for example, to decrypt it using
> the keys that were logged by the modified client, showing exactly what
> information can be seen by someone in possession of each secret key, and
> conversely which keys are necessary in order to learn which information.
>
> --
> Seth Schoen  <schoen at eff.org>
> Senior Staff Technologist                       https://www.eff.org/
> Electronic Frontier Foundation                  https://www.eff.org/join
> 815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
> ------------------------------
>
> End of tor-talk Digest, Vol 77, Issue 11
> ****************************************
>


More information about the tor-talk mailing list