Exit node DGA spoofing #4390
Pantyhose-X
started this conversation in
Ideas
Replies: 1 comment
-
Wow, this sounds amazing , a novel and interesting approach to say the least imho !!!. Although …it might be a bit dated nowadays maybe ? With all the ML that is going on, novel attacks and fingerprinting on tor …? Read a bunch of crazy stuff a few months back. Could you expand on the idea or how it would be implemented without too much of a performance hit? Do we even need clearnet? do we need DNS for this stuff? I mean internet is not just HTTP , right? :) |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
user ---> Exit node ---> DGA ---> Internet
This reduces the risk of node address exposed.
Beta Was this translation helpful? Give feedback.
All reactions