[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] [Censorship in Russia] Make HTTPS/Moat captcha more complex?



On 2021-12-22 22:42, Gary C. New via tor-relays wrote:
I know it might be a fundamental change to the Tor network, but would
it be possible to obfuscate the Tor bridge/relay addresses with their
respective fingerprints; similar, to the I2P network? I've often
thought that this aspect of the I2P network is one that is implemented
well. Perhaps Directory Authorities could preform fingerprint to
address resolution? I think it would be extremely beneficial if
neither bridge or relay addresses were published in the wild. It would
make great strides in further buffering the Tor network from various
black-listing/censorship techniques.

The thing is, while Tor itself is decentralized, the directory authorities and fallback directories are not.

For a Tor client to bootstrap, you need a list of relays to be able to connect to. And in turn you have to contact the dirauths or the fallbacks.

While you could use an I2P-style or more recently blockchain-style setup, I believe there was a reason for Tor to use centralized dirauths.

I can't seem to find the article/FAQ right now, even though I had it a few years ago. I'm guessing it's to prevent malicious dirauths, unlike how Bitcoin could get manipulated by bad actors with a decentralized authority system.

Respectfully,

Gary

-Neel
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays