[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-dev] Snowflake server and traffic analysis questions
Goal: We (Whonix) are researching optional bridge hosting for our users
to thwart web fingerprinting. Snowflake makes the most sense since no
NAT hole-punching is needed. Correct me if I'm wrong here because if
that was possible with obfs4 or meek it would save a lot of work.
We now know acting as a bridge makes the user act as a guard node and
not just a rendezvous to one.[1]
[1]
https://tor.stackexchange.com/questions/3636/what-is-the-relationship-between-guard-nodes-and-bridges
Some questions to help with implementation:
* Do the user's own data go through just two hops as well or are they
sent to the guard node they chose before deciding to run as a bridge?
How do configure Tor to do the former if it isn't?
* Are there plans to create signed debs for snowflake client/server so
we can use it with Debian's tor daemon?
* Do Tor Browser bundles with the snowflake addon also include the
server component?
* Do Alpha bundles have this code yet?
* When are these bundles expected to arrive to stable?
* Is it possible to interact headlessly with the snowflake server
component via commandline? How?
* How can we run TBB headlessly so users don't mistakenly interact with
it on the gateway?
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev