[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: tor is blocked in china
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: tor is blocked in china
- From: Lu Wei <luweitest@xxxxxxxxx>
- Date: Thu, 23 Dec 2010 13:49:16 +0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 23 Dec 2010 00:50:02 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=QmCzhAg5O72UmzKUf96t+NG1EL6wziKc0yRZoSdf39o=; b=a75GujsK67NYw9YYuoRQfHne/3jCvJYnR3i/gyMM65oAJhyIqCN/XupF3j4gEwN0rg DaGYX364YXTc2FLEGNrKk4RjgDlHfdnphGOf3LnwEtPkJQTDHyP3DasSyUB3um9DmRuI meBfvWFy1u03NuTxbngVCm5rA9NYZZES6eylE=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=HiO1Qz2eBI8RJ36/zq+hih+5ZTCjF+LqWeRlXPDwsVSE7CQ/A6U7v3F0FyCcyWfdFT N8VHsODXCa6azPYuH2d4x58xL/d0VQ6BEth4hCON9QlnID2fEC8Gq7cAOr2G6uarRv4b nYKmzZKmLflVK2nlC9qUK0TgRKLPDHBWAPL6A=
- In-reply-to: <20101221140810.GA709@xxxxxxxxxxxxxx>
- References: <4D105885.9010804@xxxxxxxxx> <20101221140810.GA709@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Gecko/20101207 Lightning/1.0b2 Thunderbird/3.1.7
andrew@xxxxxxxxxxxxxx wrote on 2010-12-21 22:08:
> ...
Thank you for the confirmation. Someone kindly gave me a private bridge,
it failed yesterday but worked today. I think that's because it's a
dynamic address. Fortunately they have not blocked all dynamic DNS
service. Only a little inconvenience is that bridge address must be
entered digitally.
>
> Many users in China are using vpns and other insecure proxies, and then
> using tor over those technologies to protect their traffic and browsing.
> Fluffybunny vpn, hot spot shield, and others are popular right now.
Most people use products from internetfreedom.org, as vpns and proxies,
they are not designed specifically for anonymity, but availability and
speed. Although chained usage with tor is possible, the performance is
drastically slow.
>
> We want to roll out a better bridge design that makes it vastly more
> expensive to try to block. The research and development on this step has
> been underway for a while. Other projects to simply increase the
> quantity of bridges are the Torouter [1] and bridge-bundle [2] plans we're
> working on towards a March 2011 release.
>
> [1]
> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter
>
> [2]
> https://trac.torproject.org/projects/tor/wiki/projects/ExperimentalBridgeBundles
>
Do you have plan to implement some friend-to-friend mechanism? The
ultimate threat is that any publicly retrievable data could also be
retrieved by the admins. A little off topic; Looking forward to your
good news.
--
Regards,
LU Wei
PGP key ID: 0x92CCE1EA
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/