Re: [tor-talk] Traffic shaping attack

20 Mar
2016
20 Mar
'16
11:29 p.m.
On 3/20/16, Mike Perry <mikeperry@torproject.org> wrote:
Related... why a traffic fill solution may need to reclock and transmit new own random jitter and self limit to processable / expected bandwidth contracts to mask network induced computation and provide for CPU headroom therein. As with [John Gilmore's?] IEEE fill layer suggestion, there should be a group establish outside just Tor calling for participants to look at various crypted network fill models against now known / surmised G[P]A methods.
3311
Age (days ago)
3311
Last active (days ago)
0 comments
1 participants
participants (1)
-
grarpamp