[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Please Remove Tor bridge and... from Censorship countries.
How can I find a good list of secure Bridge?
On Tuesday, November 8, 2016 1:38 PM, Jonathan Marquardt <mail@xxxxxxxxxxxx> wrote:
One thing should be clear:
If one is not using a bridge, it is trivial for any network observer
(University firewall admin, Iran ISP) to see if one is using Tor. However,
with the right bridge setup such a detection can ultimately be prevented. I
guess meek is the best candidate for an undetectable bridge.
On Mon, Nov 07, 2016 at 09:56:01AM -0800, Seth David Schoen wrote:
> Jason Long writes:
>
> > To be honest, I guess that I must stop using Tor!!!! It is not secure.I can remember that in torproject.org the Tor speaking about some peole that use Tor. For example, reporters, Military soldiers and...But I guess all of them are ads. Consider a soldier in a country that want send a secret letter to his government and he want to use Tor but the country that he is in there can sniff his traffic :(
>
> That soldier has a potential problem if the government is aggressively
> monitoring Internet traffic, because they can look at the time that the
> message was received and ask "who was using Tor in our country at that
> time?". This happened in 2013 when someone sent a bomb threat using
> Tor on his university campus. Apparently he was the only person using
> Tor on campus at the time the threat was sent.
>
> http://www.dailydot.com/crime/tor-harvard-bomb-suspect/
>
> The ability to do this doesn't require the government to operate any of
> the nodes and doesn't require them to be operated in the same country.
> For instance, Harvard University was able to identify this person even
> though he was using only Tor nodes that were outside of the university's
> network. (It might have been much harder if he had been using a bridge
> that the university didn't know about, or if he had sent the threat
> from somewhere outside of the campus network.)
>
> If there are ways of sending the letter that introduce a delay, then it
> might be harder for the government to identify the soldier because then
> there is some amount of Tor use at a time that's not obviously related
> to the sending of the letter. There might still be a concern that the
> amount of data that the soldier transmitted over the Tor network is
> very similar to the size of the letter, which may be a unique profile.
> (That's a concern for systems like SecureDrop because people upload
> large documents with a unique size; the number of people who transmitted
> that exact amount of information on a Tor connection in a particular
> time frame will be very small.)
>
> There's lots to think about and a good reminder that the Tor technology
> isn't perfect. But I wouldn't agree with the idea that there's no point
> in using Tor. Lots of people are getting an anonymity benefit from
> using it all of the time.
>
> --
> Seth Schoen <schoen@xxxxxxx>
> Senior Staff Technologist https://www.eff.org/
> Electronic Frontier Foundation https://www.eff.org/join
> 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk