On 07.10.2013 21:11, dardok wrote: > I guess that you misunderstood the concept of obfsproxy. It is useful > to obfuscate the communication between a client within a censorship > zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol > communication, instead it is designed to look random (and the packets > are encypted). So if you try to run this service over the HTTP port 80 > and the packets are random and not looking like a HTTP communication, > it will be more suspicious than running this service over any other port. Thank you. I understood the concept but not the implementation. "For example, there MIGHT be a HTTP transport which transforms Tor traffic to look like regular HTTP traffic." I missed the "MIGHT" part. Too bad this doesn't exist. -- Zapisz moj nowy prywatny adres email: gdr@xxxxxxxx Teraz na wlasnym serwerze. Zawsze czysto - zawsze sucho - zawsze pewnie. Klucz PGP to nadal 4ED3D2B7
Attachment:
0x4ED3D2B7.asc
Description: application/pgp-keys
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays