[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor limitation



I Would be willing to bet that the most effective P2P over there
(behind the wall) are Darknets.

as briefly mentioned here:
http://www.cio.com/archive/110105/tl_filesharing.html?action=print
and
http://www.darknet.com/darknets/

I was just thinking about how I would go about finding information on
best anonymity practices in china, but realized that information would
probably be hard to come by. The ones that failed probably arent able
to be talked about (stupid censorship), and the ones that are working
probably aren't advertised anywhere.
Brings to mind bashing my head up against a wall... so let the head
bashing commence...

-=Matt=-
On 11/15/05, ADB <firefox-gen@xxxxxxxxxx> wrote:
> Has the EFF sent anyone to China to check this out and hopefully get some
> more details? It would be especially interesting to find out what the
> situation is for other P2P and anonymity networks w/in china. If they are
> alive, how? If they got canned, what were their mistakes that lead to it?
> ~Andrew
>
> Matt Thorne wrote:
> most of the censoring, in china at least, is done automatically with
no
> human intervention. In my statement I ment that having an exit node
behind
> the firewall would give us the same restrictions that they are
having to
> deal with right now. for most people that really wouldn't
impact their lives
> that much, except that there would be some pages
that you counldn't view,
> and some messages that you couldn't send.
 BUT.
there is always a but,
We,
> for the most part, are from countires that don't have restrictions
on
> speach, so we would set off all of the flags that the censoring
software was
> looking for, and the ISP would be ordered to cut the
connection pretty
> quickly. Personally I don't think that an exit or
entry server would last
> more than 5 minutes on china's web.

On 11/14/05, Bob <monfster@xxxxxxxxx>
> wrote:

> Well, the faq says "If you want to avoid most if not all abuse
> potential,
set it to "reject *:*". This is called being a "middleman" node."
> - but can
that also be an Entry node?

However, I think someone running any
> type of tor SERVER node behind the
Great Firewall would have a lot more to
> worry about than just pissing off
their isp...

-----Original
> Message-----
From: owner-or-talk@xxxxxxxxxxxxx
> [mailto:owner-or-talk@xxxxxxxxxxxxx] On
Behalf Of ADB
Sent:
> Monday, November 14, 2005 2:09 PM
To: or-talk@xxxxxxxxxxxxx
Subject: Re: Tor
> limitation

OK. I was going to say, "Tor should be able to get through it!".
> The point
is, if you have a bunch of tor nodes, especially geographically
> disparate
ones, the load should be spread out, no?
Are they default-allow or
> default-deny over there?

Bob wrote:

 I think there was a tag missing - I
> think it was:

 <Sarcasm>yes I really want to use an exit node that is
> located
behind the
 great
 firewall...</Sarcasm>

 -----Original
> Message-----
 From:
> owner-or-talk@xxxxxxxxxxxxx
[mailto:owner-or-talk@xxxxxxxxxxxxx]
> On
 Behalf Of Arrakistor
 Sent: Monday, November 14, 2005 1:34 PM
 To: Matt
> Thorne
 Subject: Re[2]: Tor limitation

 Hello Matt,

 Somehow, I don't
> think China will kindly look upon those running
Tor
 servers inside their
> country. Infact, I am concerned about
the
 integrity of Tor servers which
> have data passing through
Chinese
 servers, as it seems hard to believe
> their government would allow
them
 to exist without their approval.

 Has
> anyone else had such concerns, or any answers to such concerns?

 Regards,

> ST


 Monday, November 14, 2005, 3:18:21 PM, you wrote:



 yes I really
> want to use an exit node that is located behind
the great
 firewall...





> On 11/14/05, ADB <firefox-gen@xxxxxxxxxx>
<mailto:firefox-gen@xxxxxxxxxx>
> wrote:


 Here's an easy solution for our buddies under commie
control: SET
> UP MORE
 TOR EXIT NODE & DIR SERVERS! It's not tha hard! ;)
 ~Andrew

> Darren Griffith wrote:
 Many of the Chinese who are using tor
> are
complaining that it is too


 slow to


 be usable by them. I imagine
> that those who feel
they need to


 use this


 program don't mind it being
> at about dial-up speeds.





 I'm in Beijing and I'm happy that Tor is
> there when
I need it. In


 fact,


 en.wikipedia.org is now blocked by my
> ISP, so Tor is
almost


 essential. But


 yes, it's pretty slow, though I'm
> patient. Only
lately,


 I'm consistently


 getting DNS lookup failures,
> and that's what's
mostly


 eroding my experience


 of using Tor all the
> time. (I know I should


 change the config of my client


 to give more
> logging info so I can


 track down this bad exit node, but I


 haven't
> made the effort yet.)





 --
 Darren Paul


 Griffith


> www.madphilosopher.ca








 --


> <a



href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu
> age=us&domain=PHOENIXOFLIGHT.COM"
<http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u
s&domain=PHOENIXOFLIGHT.COM>
> >The


 domain Phoenixoflight.com is for sale!</a>






 --
 Best regards,
> Arrakistor
> mailto:arrakistor@xxxxxxxxx








--
<a
href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu
age=us&domain=PHOENIXOFLIGHT.COM"
<http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u
s&domain=PHOENIXOFLIGHT.COM>
> >The domain Phoenixoflight.com is for sale!</a>




>


>
> --
<a
> href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM";>The
> domain Phoenixoflight.com is for sale!</a>
>