On 1/23/19, nusenu <nusenu-lists@riseup.net> wrote:
thanks for adding tor relays. If you are using them for research purposes please ensure you follow the safety guidelines: https://research.torproject.org/safetyboard.html https://medium.com/@nusenu/some-tor-relays-you-might-want-to-avoid-5901597ad... https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays | Up | Ext | JoinTime | Nickname | Version | IP | AS | CC | ORp | Dirp | OS | Contact | eFamMembers | FP | https://twitter.com/nusenu_ https://mastodon.social/@nusenu
As many know, many guidelines regarding the stronger distributed encrypted overlay and messaging networks out there are naturally voluntary, and research and attacks are often generally unenforceable and or undetectable when undertaken by qualified adversaries. Many parties [publicly] subscribe to such guidelines, many [silently] don't. That's the nature [and one of the risks] of such networks, indeed of any network. Such adversaries exist and are highly active and capable. Know your adversary. Strengthen your designs to match and best them. As to the nodes, they're all planet-lab.net hosts, planetlab has at least two known tor slices "okstate_tor" and "uml_ZhenLing", some public research outputs [or not] of which might be listed below... https://www.cs.uml.edu/~xinwenfu/paper/TorCellSize_ICC11_Fu.pdf https://www.cs.uml.edu/~xinwenfu/paper/TorWard14_Fu.pdf http://cse.seu.edu.cn/PersonalPage/zhenling/publications_files/infocom2014_T... http://cse.seu.edu.cn/PersonalPage/zhenling/publications_files/infocom2013_P... http://cse.seu.edu.cn/PersonalPage/zhenling/publications_files/infocom2012_E... https://news.okstate.edu/articles/communications/2015/tedx-returns-oklahoma-... https://www.youtube.com/watch?v=9QsjkJcUznA MEMEX Christopher White ā€ˇJiangmin yu, Eric Chan-Tin: Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks DOI: 10.1109/ICDCS.2018.00175 Conference: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) Identifying Webbrowsers in Encrypted Communications DOI: 10.1145/2665943.2665968 Revisiting Circuit Clogging Attacks on Tor DOI: 10.1109/ARES.2013.17 Conference: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on https://chantin.cs.luc.edu/~chantin/ARES2013.pdf Application Of Data Analytics - Case Studies https://shareok.org/bitstream/handle/11244/54637/Yu_okstate_0664D_15098.pdf