-
Dont take this down, its for reference
t50 -> Packet floods (both TCP and UDP and more)
DHCPig -> DHCP exhaustion for whole network DoS
THC-SSL-DOS -> SSL recognition attacks (SSL DoS)
mdk3 ->…
-
I wrote https://www.github.com/ioerror/tlsdate for systems where we wished to have relatively accurate (~1sec) clocks and as a simple trade off, we receive authenticated time. I suggest that rather th…
-
On Precisely Detecting Censorship Circumvention in Real-World Networks
Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
https://www.robgjansen.com/publications/precisedetect-ndss2024.html…
wkrp updated
11 months ago
-
This is a shot in the dark, but what the heck.
Orwall is a project trying to proxy all network traffic through anonymizing proxies like tor and i2p. Ideally it should have access to the `iptables` co…
-
Here are some ideas I have for new awards. Not sure if you'd be interested in implementing them.
- Exit award - the relay accepts exit traffic on port 80 or 443. It's good to encourage more relays to …
-
I was notified by email that there are non-working links. I have looked at this section and can verify issues.
-
IRC was only ever intended as a starting point, eventually another messaging channel will be found because ultimately IRC will always been inferior. There are a few ideas for which p2p network to use,…
-
```
What steps will reproduce the problem?
1. Doing a call
2.
3.
What version of the product are you using? On what device/operating system?
1.5.1 beta
Which type of network are you using?
Wlan
…
-
```
What steps will reproduce the problem?
1. Doing a call
2.
3.
What version of the product are you using? On what device/operating system?
1.5.1 beta
Which type of network are you using?
Wlan
…
-
```
Would be great to have a Proxy Server built in to PeerBlock. This would
let us 1) protect a user's entire network, and 2) automatically redirect
(certain types of?) traffic through a third-party …