[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?



On Wed, 03 Oct 2018 08:41:29 +0000, ithor wrote:
...
> So would there be a way to (pen-?)test a private obfs4 bridge as being non blacklisted and actually usable without really trying to connect to it and alarming my ISP and DPI the like ?

Obviously not. To test that you need to try to connect to it and
consequently risk running into a block.

For the paranoid: The firewall operator might just as well just log who
is using known brigde (incl. obfs4) addresses but letting the connections
pass to just see who is using tor.

> This seems like an overlooked security and privacy issue with a lot of possible consequences.

It's not as much overlooked but almost impossible to avoid. The only
is/was domain fronting on a cloud provider and might be encrypted SNI 
once that itself is widely deployed - only then do you look the same
as regular internet users.

On the other hand, the question is whether using tor itself is outlawed or raising suspicion in your country.

> Same thing for the entry-nodes. How can I know for sure the randomly selected one isn't rune by some gvt trol ?

By knowing and trusting the operator. That's the reason tor stopped
swapping entry nodes around - the fewer you use the lower the risk.

Also, geographic selection: Depending on the country of the relay,
trolls are unlikely to report to your gvt.

- Andreas

-- 
"Totally trivial. Famous last words."
From: Linus Torvalds <torvalds@*.org>
Date: Fri, 22 Jan 2010 07:29:21 -0800
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk