Hi,
coderman wrote (03 May 2015 03:37:17 GMT) :
a friend and i are working on a Tor router design that doesn't compromise anonymity for convenience. [0][1][2][3][4]
Thanks!
please provide feedback in reply on this thread or to me directly.[6]
Just to clarify, the threat model explicitly doesn't include "Attacker is able to reconfigure Tor on a client system to use an arbitrary set of bridges", right?
Cheers, -- intrigeri