[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?
#32026: Using An Alternative To TCP To Avoid Packet Injection?
-----------------------------------------------+------------------------
Reporter: Aphrodites1995 | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Circumvention/Censorship analysis | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------------+------------------------
Comment (by dcf):
Replying to [comment:4 arma]:
> Replying to [comment:3 dcf]:
> > In China, it's some combination of at least the following techniques:
> > * Running middle nodes and recording the addresses that connect to
them.
>
> Wow, is this one thought to actually be happening? Citation or details?
:)
>
> If so, we could conceivably run some private obfs4 bridges and connect
to public relays in an ordered fashion to figure out which ones are
watching, "bad relays trap" style.
Sorry, it was a mistake to list the middle-node technique under the China
heading. As far as I know, there's no evidence that the GFW does that.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs