[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?
#32026: Using An Alternative To TCP To Avoid Packet Injection?
-----------------------------------------------+------------------------
Reporter: Aphrodites1995 | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Circumvention/Censorship analysis | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------------+------------------------
Comment (by arma):
Replying to [comment:3 dcf]:
> In China, it's some combination of at least the following techniques:
> * Running middle nodes and recording the addresses that connect to
them.
Wow, is this one thought to actually be happening? Citation or details? :)
If so, we could conceivably run some private obfs4 bridges and connect to
public relays in an ordered fashion to figure out which ones are watching,
"bad relays trap" style.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs