[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] [Censorship in Russia] Make HTTPS/Moat captcha more complex?



On Thursday, December 23, 2021 7:42:09 AM CET Gary C. New via tor-relays 
wrote:
> I know it might be a fundamental change to the Tor network, but would it be
> possible to obfuscate the Tor bridge/relay addresses with their respective
> fingerprints; similar, to the I2P network? I've often thought that this
> aspect of the I2P network is one that is implemented well. Perhaps
> Directory Authorities could preform fingerprint to address resolution? I
> think it would be extremely beneficial if neither bridge or relay addresses
> were published in the wild. It would make great strides in further
> buffering the Tor network from various black-listing/censorship techniques.

The idea sounds good at first. Fingerprint and Cert from bridges are already 
issued by the BridgeDB.
But: I2P is nearly the same as Tor Hidden Services. Tor-Browser to bridge is a 
p2p connection and therefore no problem to see the IP anyway.

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays