[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Bridges that can't be discovered by their own clients



Hi,

Say you have a LAN and provide connectivity into Tor via a bridge. You
don't want users to identify where your bridge is, but you want to provide
them direct access into the Tor network. You disable fingerprint
publishing and they use a fixed LAN IP to provide connectivity out of.

Can they then take the fingerprint they see when talking to the bridge and
compare it to a relay that they own and find the bridge's public and
"real" IP?

If this doesn't work, is there any known way to provide connectivity where
the clients cannot figure out where the connectivity is coming from? Like
in the case of hidden hosting?

Preferably in a way where you torify all traffic but they can host their
own hidden services without a double-Tor penalty (hence the bridge idea).

Thank you!

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk