Yeah. Go I2p and tor rendezvous! Seriously though, someone on EFF
or IETF's payroll has got to be willing and able to go over there and
check it out. If these orgs REALLY want to know what's going on over
there and help people, they need current, reliable information, right? Matt Thorne wrote: I Would be willing to bet that the most effective P2P over there (behind the wall) are Darknets. as briefly mentioned here: http://www.cio.com/archive/110105/tl_filesharing.html?action=""> and http://www.darknet.com/darknets/ I was just thinking about how I would go about finding information on best anonymity practices in china, but realized that information would probably be hard to come by. The ones that failed probably arent able to be talked about (stupid censorship), and the ones that are working probably aren't advertised anywhere. Brings to mind bashing my head up against a wall... so let the head bashing commence... -=Matt=- On 11/15/05, ADB <firefox-gen@xxxxxxxxxx> wrote:Has the EFF sent anyone to China to check this out and hopefully get some more details? It would be especially interesting to find out what the situation is for other P2P and anonymity networks w/in china. If they are alive, how? If they got canned, what were their mistakes that lead to it? ~Andrew Matt Thorne wrote: most of the censoring, in china at least, is done automatically withnohuman intervention. In my statement I ment that having an exit nodebehindthe firewall would give us the same restrictions that they arehaving todeal with right now. for most people that really wouldn'timpact their livesthat much, except that there would be some pagesthat you counldn't view,and some messages that you couldn't send.BUT. there is always a but, We,for the most part, are from countires that don't have restrictionsonspeach, so we would set off all of the flags that the censoringsoftware waslooking for, and the ISP would be ordered to cut theconnection prettyquickly. Personally I don't think that an exit orentry server would lastmore than 5 minutes on china's web.On 11/14/05, Bob <monfster@xxxxxxxxx>wrote:Well, the faq says "If you want to avoid most if not all abuse potential,set it to "reject *:*". This is called being a "middleman" node."- but canthat also be an Entry node? However, I think someone running anytype of tor SERVER node behind theGreat Firewall would have a lot more toworry about than just pissing offtheir isp... -----OriginalMessage-----From: owner-or-talk@xxxxxxxxxxxxx[mailto:owner-or-talk@xxxxxxxxxxxxx] OnBehalf Of ADB Sent:Monday, November 14, 2005 2:09 PMTo: or-talk@xxxxxxxxxxxxx Subject: Re: TorlimitationOK. I was going to say, "Tor should be able to get through it!".The pointis, if you have a bunch of tor nodes, especially geographicallydisparateones, the load should be spread out, no? Are they default-allow ordefault-deny over there?Bob wrote: I think there was a tag missing - Ithink it was:<Sarcasm>yes I really want to use an exit node that islocatedbehind the great firewall...</Sarcasm> -----OriginalMessage-----From:owner-or-talk@xxxxxxxxxxxxx[mailto:owner-or-talk@xxxxxxxxxxxxx]OnBehalf Of Arrakistor Sent: Monday, November 14, 2005 1:34 PM To: MattThorneSubject: Re[2]: Tor limitation Hello Matt, Somehow, I don'tthink China will kindly look upon those runningTor servers inside theircountry. Infact, I am concerned aboutthe integrity of Tor servers whichhave data passing throughChinese servers, as it seems hard to believetheir government would allowthem to exist without their approval. Hasanyone else had such concerns, or any answers to such concerns?Regards,STMonday, November 14, 2005, 3:18:21 PM, you wrote: yes I reallywant to use an exit node that is located behindthe great firewall...On 11/14/05, ADB <firefox-gen@xxxxxxxxxx><mailto:firefox-gen@xxxxxxxxxx>wrote:Here's an easy solution for our buddies under commie control: SETUP MORETOR EXIT NODE & DIR SERVERS! It's not tha hard! ;) ~AndrewDarren Griffith wrote:Many of the Chinese who are using torarecomplaining that it is too slow to be usable by them. I imaginethat those who feelthey need to use this program don't mind it beingat about dial-up speeds.I'm in Beijing and I'm happy that Tor isthere whenI need it. In fact, en.wikipedia.org is now blocked by myISP, so Tor isalmost essential. But yes, it's pretty slow, though I'mpatient. Onlylately, I'm consistently getting DNS lookup failures,and that's what'smostly eroding my experience of using Tor all thetime. (I know I shouldchange the config of my client to give morelogging info so I cantrack down this bad exit node, but I haven'tmade the effort yet.)-- Darren Paul Griffithwww.madphilosopher.ca--<ahref=""moz-txt-link-freetext" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu">http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM"<http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u s&domain=PHOENIXOFLIGHT.COM>Thedomain Phoenixoflight.com is for sale!</a> -- Best regards,Arrakistor mailto:arrakistor@xxxxxxxxx-- <a href="" class="moz-txt-link-rfc2396E" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">"http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu age=us&domain=PHOENIXOFLIGHT.COM" <http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u s&domain=PHOENIXOFLIGHT.COM>The domain Phoenixoflight.com is for sale!</a>--<ahref="" class="moz-txt-link-rfc2396E" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">"http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">The domain Phoenixoflight.com is for sale!</a> -- <a href="" class="moz-txt-link-rfc2396E" href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">"http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">The domain Phoenixoflight.com is for sale!</a> |