[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] how bridges work
On 5/8/2012 11:40 AM, Xinwen Fu wrote:
> This paper may help http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf.
Thanks for the analysis, it's very useful. It raises some questions that
the programmers may want to shed light on.
Based upon my reading of the report, bridge usage greater than the norm
can be due to bridge-harvesting as well as to an increase in legitimate
traffic. Since the Bridge Usage Summary isn't in real time, there's no
point in my changing the bridge address (rebooting gateway) when I see a
bump in the Summary.
But if I ran a dummy client on a different machine, would I be able to
identify harvesters from the message logs? And would it be useful to
then reassign the bridge address?
The other thing and get from the report is that while the harvesters can
identify bridges, they can't uncover the identity the clients using
those bridges. Assuming that the routing algorithm keeps clients
attached to bridges during a IP address change (that is, if it connects
clients to bridge names rather than IP addresses), wouldn't it be useful
for me to reassign my bridge address randomly, without trying to
synchronize with the harvesters? - eli
tor-talk mailing list