I Would be willing to bet that the most effective P2P over there
(behind the wall) are Darknets.
as briefly mentioned here:
http://www.cio.com/archive/110105/tl_filesharing.html?action="">
and
http://www.darknet.com/darknets/
I was just thinking about how I would go about finding information on
best anonymity practices in china, but realized that information would
probably be hard to come by. The ones that failed probably arent able
to be talked about (stupid censorship), and the ones that are working
probably aren't advertised anywhere.
Brings to mind bashing my head up against a wall... so let the head
bashing commence...
-=Matt=-
On 11/15/05, ADB <firefox-gen@xxxxxxxxxx> wrote:
Has the EFF sent anyone to China to check this out and hopefully get some
more details? It would be especially interesting to find out what the
situation is for other P2P and anonymity networks w/in china. If they are
alive, how? If they got canned, what were their mistakes that lead to it?
~Andrew
Matt Thorne wrote:
most of the censoring, in china at least, is done automatically with
no
human intervention. In my statement I ment that having an exit node
behind
the firewall would give us the same restrictions that they are
having to
deal with right now. for most people that really wouldn't
impact their lives
that much, except that there would be some pages
that you counldn't view,
and some messages that you couldn't send.
BUT.
there is always a but,
We,
for the most part, are from countires that don't have restrictions
on
speach, so we would set off all of the flags that the censoring
software was
looking for, and the ISP would be ordered to cut the
connection pretty
quickly. Personally I don't think that an exit or
entry server would last
more than 5 minutes on china's web.
On 11/14/05, Bob <monfster@xxxxxxxxx>
wrote:
Well, the faq says "If you want to avoid most if not all abuse
potential,
set it to "reject *:*". This is called being a "middleman" node."
- but can
that also be an Entry node?
However, I think someone running any
type of tor SERVER node behind the
Great Firewall would have a lot more to
worry about than just pissing off
their isp...
-----Original
Message-----
From: owner-or-talk@xxxxxxxxxxxxx
[mailto:owner-or-talk@xxxxxxxxxxxxx] On
Behalf Of ADB
Sent:
Monday, November 14, 2005 2:09 PM
To: or-talk@xxxxxxxxxxxxx
Subject: Re: Tor
limitation
OK. I was going to say, "Tor should be able to get through it!".
The point
is, if you have a bunch of tor nodes, especially geographically
disparate
ones, the load should be spread out, no?
Are they default-allow or
default-deny over there?
Bob wrote:
I think there was a tag missing - I
think it was:
<Sarcasm>yes I really want to use an exit node that is
located
behind the
great
firewall...</Sarcasm>
-----Original
Message-----
From:
owner-or-talk@xxxxxxxxxxxxx
[mailto:owner-or-talk@xxxxxxxxxxxxx]
On
Behalf Of Arrakistor
Sent: Monday, November 14, 2005 1:34 PM
To: Matt
Thorne
Subject: Re[2]: Tor limitation
Hello Matt,
Somehow, I don't
think China will kindly look upon those running
Tor
servers inside their
country. Infact, I am concerned about
the
integrity of Tor servers which
have data passing through
Chinese
servers, as it seems hard to believe
their government would allow
them
to exist without their approval.
Has
anyone else had such concerns, or any answers to such concerns?
Regards,
ST
Monday, November 14, 2005, 3:18:21 PM, you wrote:
yes I really
want to use an exit node that is located behind
the great
firewall...
On 11/14/05, ADB <firefox-gen@xxxxxxxxxx>
<mailto:firefox-gen@xxxxxxxxxx>
wrote:
Here's an easy solution for our buddies under commie
control: SET
UP MORE
TOR EXIT NODE & DIR SERVERS! It's not tha hard! ;)
~Andrew
Darren Griffith wrote:
Many of the Chinese who are using tor
are
complaining that it is too
slow to
be usable by them. I imagine
that those who feel
they need to
use this
program don't mind it being
at about dial-up speeds.
I'm in Beijing and I'm happy that Tor is
there when
I need it. In
fact,
en.wikipedia.org is now blocked by my
ISP, so Tor is
almost
essential. But
yes, it's pretty slow, though I'm
patient. Only
lately,
I'm consistently
getting DNS lookup failures,
and that's what's
mostly
eroding my experience
of using Tor all the
time. (I know I should
change the config of my client
to give more
logging info so I can
track down this bad exit node, but I
haven't
made the effort yet.)
--
Darren Paul
Griffith
www.madphilosopher.ca
--
<a
href=""moz-txt-link-freetext" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu">http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu
age=us&domain=PHOENIXOFLIGHT.COM"
<http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u
s&domain=PHOENIXOFLIGHT.COM>
The
domain Phoenixoflight.com is for sale!</a>
--
Best regards,
Arrakistor
mailto:arrakistor@xxxxxxxxx
--
<a
href="" class="moz-txt-link-rfc2396E" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">"http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu
age=us&domain=PHOENIXOFLIGHT.COM"
<http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u
s&domain=PHOENIXOFLIGHT.COM>
The domain Phoenixoflight.com is for sale!</a>
--
<a
href="" class="moz-txt-link-rfc2396E" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">"http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">The
domain Phoenixoflight.com is for sale!</a>