Hello,
Here is a document I've wrote regarding a concept to trace connections even through TOR. If you have any questions feel free to respond, and I'll attempt to explain. I have also considered a way to mitigate this situation being allowing TOR to be traced by using 'Transactional Requests.' I'll proceed to write it up, and post soon.
I have released some other short papers as well. It contains several files regarding a few vulnerabilities, and a couple concepts regarding things like quantum resistant cryptography, etc..
URL: https://mega.nz/#F!QnZRXKyS!oluyILlMPpyJjPS57w7axQ
Feel free to e-mail me directly..
Thanks, Mike Guidry
Are you trolling us? I don't get it!
On Sun, Apr 09, 2017 at 08:19:28PM -0400, Mike Guidry wrote:
Hello,
Here is a document I've wrote regarding a concept to trace connections even through TOR. If you have any questions feel free to respond, and I'll attempt to explain. I have also considered a way to mitigate this situation being allowing TOR to be traced by using 'Transactional Requests.' I'll proceed to write it up, and post soon.
I have released some other short papers as well. It contains several files regarding a few vulnerabilities, and a couple concepts regarding things like quantum resistant cryptography, etc..
URL: https://mega.nz/#F!QnZRXKyS!oluyILlMPpyJjPS57w7axQ
Feel free to e-mail me directly..
Thanks, Mike Guidry
tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev