Re: [tor-talk] WebRTC via Tor

2013-06-09 Thread mirimir
On 06/10/2013 04:56 AM, David Huerta wrote:

> Hey all,
> 
> I've been experimenting with using WebRTC in a browser using Tor with
> Twilio to see if it's not totally impossible to do voice communication
> in a way that anonymizes location (source IP). The problem is that
> Twilio WebRTC requires UDP connections over ports 10,000 to 60,000 and
> at least from my research (correct me if I'm wrong), Tor doesn't do
> onion routing for UDP traffic. As an alternative to WebRTC, there does
> seem to be a Twilio Client Flash option* which is TCP-only, but eww
> Flash. Any ideas on how to shoehorn UDP traffic into Tor-friendly TCP or
> do something else that would produce basically the same effect?
> 
> *
> http://www.twilio.com/help/faq/twilio-client/what-are-the-minimum-system-requirements-for-twilio-client

I don't know Twilio, but Mumble works well, with voice data as UDP,
using OpenVPN through Tor in TCP mode. Although latency may be as much
as 1-2 seconds, voice quality is high, with negligible choppiness.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] WebRTC via Tor

2013-06-09 Thread David Huerta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey all,

I've been experimenting with using WebRTC in a browser using Tor with
Twilio to see if it's not totally impossible to do voice communication
in a way that anonymizes location (source IP). The problem is that
Twilio WebRTC requires UDP connections over ports 10,000 to 60,000 and
at least from my research (correct me if I'm wrong), Tor doesn't do
onion routing for UDP traffic. As an alternative to WebRTC, there does
seem to be a Twilio Client Flash option* which is TCP-only, but eww
Flash. Any ideas on how to shoehorn UDP traffic into Tor-friendly TCP or
do something else that would produce basically the same effect?

*
http://www.twilio.com/help/faq/twilio-client/what-are-the-minimum-system-requirements-for-twilio-client

Thanks,

- -- 
david [.dh] huerta
davidhuerta.me

- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=mmiq
- -END PGP PUBLIC KEY BLOCK-
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJRtVyEAAoJEDXXJr2uCfMosnUIAILjf04PueCWutsT244jGMaa
9dKU3NOf9tRHx+8mPxCvWWqnbKpq+oyQCTTecxc8t82cddaP6GfjDZNDYkFhe48Q
kQqUW2thxjKh1k1ZvbToNF6lhHRTJVrMTQGvhX0yy1oAB40reUAtcQnOeHr7e0Py
HUsTevBpIAfy8iUfk+F+1nTWdw3zrz/YnHRmFYB392at7EQ0InoRyNLgZ7kgZmob
/3p4SojuuTUExhXd9+0cXIWd+8PLyjMJXaUrHo0oiDIV+nrRfqrlfrXbNMG+FD97
1LKSwRaIvv1xAPIFZPn4PJlA50AKfWG3qvyEPPF5nYrRZrF4d8zg9eoppAt5yOU=
=CibH
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Format-Transforming Encryption Pluggable Transport

2013-06-09 Thread Kevin P Dyer
We invite users to test our Tor bundles, which includes a pluggable
transport based on something we call Format-Transforming Encryption
(FTE). We believe FTE has potential to be a valuable tool to evade the
suspected protocol white-listing [4] recently reported in Iran. Tor
Bundles are available that include our FTE software and are configured
by default to work with FTE+Tor bridges deployed in the United States.
These bundles [1] and their source [2] are available on github for
OSX/Linux. Unfortunately we don't, yet, support Windows.

If you're interested in a technical discussion about FTE and how it
works, please read our paper [3] or join us over at tor-dev [5].

We're optimistic FTE has long-term potential as a tool to enable users
to control how their traffic is classified by passive DPI systems. As
one example, over the last month, we've successful tunneled Tor
through the Great Firewall of China using FTE to make our traffic
"look like" HTTP.

We're eager for feedback on this alpha release, so please do not
hesitate to contact us with questions.

-Kevin P Dyer (and his co-authors)

[1] https://github.com/redjack/FTE/tree/master/TorBundles
[2] https://github.com/redjack/FTE
[3] http://eprint.iacr.org/2012/494
[4] https://lists.torproject.org/pipermail/tor-dev/2013-May/004787.html
[5] https://lists.torproject.org/pipermail/tor-dev/2013-June/004999.html
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk