[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] MITM attack on TLS



Justin:
> I wonât get into trouble because Iâm not using regular Tor.  Iâm
> using pluggable transports, which hide the Tor traffic and make it
> unrecognizable to a DPI box.  This should be good enough even if
> Meekâs TLS is broken.

Nope, not good enough. Actually it is _regular_ Tor connection. It is
just encapsulated into HTTP (without TLS in your case) and easily
detectable with tools like tcpflow.
Try to use PTs other than meek like obfs4/ScrambleSuit.

-- 
Ivan Markin

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk