On Wed, Mar 15, 2017 at 03:43:10PM -0400, Roger Dingledine wrote: > Jonathan responded with: > > You want to hide the fact that you are using an anonymization network > > by using an anonymization network. This idea seems pretty stupid to me. > > But I think that's taking a very narrow view of pluggable transports. > Many people want to use Tor and/or pluggable transports to get around > censorship that otherwise prevents them from reaching the sites they > want to reach. > > (Getting around censorship with no security at all is probably a bad > idea -- we keep learning that lesson as people from Iran, Egypt, etc say > "my government is stupid, they don't know how to surveil the Internet, > just let me get to Facebook" and then they realize once it's too late that > maybe they should have had some more security. So the Tor perspective is > that we should give them as many ways to get around censorship, while > getting most of Tor's security properties, as we can, but we shouldn't > help people with insecure approaches.) Yes, having more options is always a good thing, I agree with that. I just don't think that developing an I2P transport wouldn't be worth anyone's time. I2P's protocols are quite unusal and should be relatively easy to block by using DPI. On top of that hosting the bridge servers might me a little more work as it requires some extra firewall rules for that, if I'm not mistaken. I2P's protocols have some problems in some networks anyway. The SSU protocol isn't even compatible with a SOCKS proxy, let alone HTTP proxy. I2P protocols: https://geti2p.net/en/docs/how/tech-intro#op.transport I2P is probably also not the easiest thing to implement due to it's complexity and it's currently only implemented in Java, which is not exactly a good basis for a pluggable transport. > That said, one of the side effects of making a successful i2p pluggable > transport would be that censors would have more incentive to censor > i2p connections. Speaking of which, I have no idea if i2p connections > right now are hard or easy to DPI for. But attracting the attention of > Tor's adversaries could speed up the arms race there, which could be a > sad result. Absolutely. It's like the opposite of something like meek where we use servers which they don't want to block. These governments however will probably have no problems with I2P. If anything, they'll be glad we made them take notice of it. -- 4096R/1224DBD299A4F5F3 47BC 7DE8 3D46 2E8B ED18 AA86 1224 DBD2 99A4 F5F3
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk