[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] Tor Launcher settings UI feedback request
On Sat, May 04, 2013 at 02:09:33AM -0700, Mike Perry wrote:
| Thus spake Andrew Lewman (andrew@xxxxxxxxxxxxx):
| > One answer is the user shouldn't care. Tor Browser should automatically
| > loop through the various kinds of connectivity and just connect.
| > non-obfs bridges really should get wholly replaced with obfs bridges en
| > masse.
|
| However, we can't just probe everything because we don't want to probe
| for the public Tor network if you're censored. Best case: client IPs
| that are observed to probe various known Tor transports get targeted for
| more agressive censorship (the censor could just fail any unrecognizable
| traffic for N minutes after someone touches a public Tor IP, for
| example). Worst case: Targeted exploits are deployed that aim to subvert
| their computer in general, via Tor or otherwise.
|
| It's tempting to say this means we should have either just two bundles
| or perhaps just an "I'm censored" checkbox at startup.
I think this might be the right direction. The person running Tor
knows two things: if they're worried about someone monitoring their
network right now, and how technical they are (and their desire to tweak
settings).
The UI could thus start:
"Should Tor do our best to figure out how to get connected, at risk of
drawing attention and response if you're on a heavily-monitored
network?"
[I need to be careful, I'll configure things (Recommended) ]
[ Probe the network (Riskier) ]
[ I'm not sure, please help me decide]
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev