Hi all, If bridges users configure at least two bridges in different /16s, it makes it harder to run some kinds of statistical attacks on the paths that they build through the Tor network. (For example, working out that relays in that /16 are never used by the client.) For context, see this Twitter thread: I think that: * most of the current default Tor Browser bridges are in at least two /16s, except for the single-bridge pluggable transports, * almost all the 3-bridge sets given out by BridgeDB are in at least two /16s. Should we: * document this as a recommendation? Where? * add code to Tor that warns when it isn't true? (Maybe not?) * make sure all of the Tor Browser bridges are across two or three /16s? * make sure BridgeDB gives out bridge sets in two or three /16s? T |
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev