freedomofpress / fingerprint-securedropLinks
A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.
☆30Updated 8 years ago
Alternatives and similar repositories for fingerprint-securedrop
Users that are interested in fingerprint-securedrop are comparing it to the libraries listed below
Sorting:
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Ansible role to install & maintain Tor Hidden Services☆27Updated 6 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆19Updated 9 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆44Updated 6 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆49Updated 4 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- ☆29Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Proof-of-concept allowing you to prevent/block browser fingerprinting (ESORICS 2015).☆20Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- A user-first approach to threat modeling.☆17Updated last month
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Command-line utility to control Tor.☆89Updated last year
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago
- ☆31Updated 5 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- ☆62Updated 11 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- ☆16Updated 9 years ago
- ☆30Updated 10 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago