[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor limitation
I Would be willing to bet that the most effective P2P over there
(behind the wall) are Darknets.
as briefly mentioned here:
I was just thinking about how I would go about finding information on
best anonymity practices in china, but realized that information would
probably be hard to come by. The ones that failed probably arent able
to be talked about (stupid censorship), and the ones that are working
probably aren't advertised anywhere.
Brings to mind bashing my head up against a wall... so let the head
On 11/15/05, ADB <firefox-gen@xxxxxxxxxx> wrote:
> Has the EFF sent anyone to China to check this out and hopefully get some
> more details? It would be especially interesting to find out what the
> situation is for other P2P and anonymity networks w/in china. If they are
> alive, how? If they got canned, what were their mistakes that lead to it?
> Matt Thorne wrote:
> most of the censoring, in china at least, is done automatically with
> human intervention. In my statement I ment that having an exit node
> the firewall would give us the same restrictions that they are
> deal with right now. for most people that really wouldn't
impact their lives
> that much, except that there would be some pages
that you counldn't view,
> and some messages that you couldn't send.
there is always a but,
> for the most part, are from countires that don't have restrictions
> speach, so we would set off all of the flags that the censoring
> looking for, and the ISP would be ordered to cut the
> quickly. Personally I don't think that an exit or
entry server would last
> more than 5 minutes on china's web.
On 11/14/05, Bob <monfster@xxxxxxxxx>
> Well, the faq says "If you want to avoid most if not all abuse
set it to "reject *:*". This is called being a "middleman" node."
> - but can
that also be an Entry node?
However, I think someone running any
> type of tor SERVER node behind the
Great Firewall would have a lot more to
> worry about than just pissing off
> [mailto:owner-or-talk@xxxxxxxxxxxxx] On
Behalf Of ADB
> Monday, November 14, 2005 2:09 PM
Subject: Re: Tor
OK. I was going to say, "Tor should be able to get through it!".
> The point
is, if you have a bunch of tor nodes, especially geographically
ones, the load should be spread out, no?
Are they default-allow or
> default-deny over there?
I think there was a tag missing - I
> think it was:
<Sarcasm>yes I really want to use an exit node that is
Behalf Of Arrakistor
Sent: Monday, November 14, 2005 1:34 PM
Subject: Re: Tor limitation
Somehow, I don't
> think China will kindly look upon those running
servers inside their
> country. Infact, I am concerned about
integrity of Tor servers which
> have data passing through
servers, as it seems hard to believe
> their government would allow
to exist without their approval.
> anyone else had such concerns, or any answers to such concerns?
Monday, November 14, 2005, 3:18:21 PM, you wrote:
yes I really
> want to use an exit node that is located behind
> On 11/14/05, ADB <firefox-gen@xxxxxxxxxx>
Here's an easy solution for our buddies under commie
> UP MORE
TOR EXIT NODE & DIR SERVERS! It's not tha hard! ;)
> Darren Griffith wrote:
Many of the Chinese who are using tor
complaining that it is too
be usable by them. I imagine
> that those who feel
they need to
program don't mind it being
> at about dial-up speeds.
I'm in Beijing and I'm happy that Tor is
> there when
I need it. In
en.wikipedia.org is now blocked by my
> ISP, so Tor is
yes, it's pretty slow, though I'm
> patient. Only
getting DNS lookup failures,
> and that's what's
eroding my experience
of using Tor all the
> time. (I know I should
change the config of my client
to give more
> logging info so I can
track down this bad exit node, but I
> made the effort yet.)
domain Phoenixoflight.com is for sale!</a>
> >The domain Phoenixoflight.com is for sale!</a>
> domain Phoenixoflight.com is for sale!</a>