Hi,
after reading the new developments concerning the chinese GFW, I wonder
what technically interested people or even people with server
capabilities could do, to help fight censorship (besides running a TOR
relay/node/exit/hidden service or some webproxy).
Are there other services/systems someon
file.
How can i fix it?
2010/5/28 frank
> thanks a lot for your kind help, andrew.
>
> sincerely,
>
> frank
> 2010-05-28
>
> -
> sender: andrew
> sending date: 2010-05-27 19:35:14
> receiver: or-talk
thanks a lot for your kind help, andrew.
sincerely,
frank
2010-05-28
-
sender: andrew
sending date: 2010-05-27 19:35:14
receiver: or-talk
cc:
subject: Re: Re: Bridges and China (new thread)
On Thu, May 27, 2010 at 12
On Thu, 27 May 2010 17:17:51 +0800
代尔欣 wrote:
> I also have this problem(bridges are blocked) and sent a mail
> several days ago. Now I know what happened. But how to get a *free*
> http proxy address? I searched on internet. It seems not easy find a
> valid one.
There are millions of http/h
On Thu, May 27, 2010 at 12:36:51PM +0800, for.tor.bri...@gmail.com wrote 2.1K
bytes in 57 lines about:
: why not put the tor directory server in https mode too?
Your client makes a 1-hop tunnel to the directory server if it needs to
get the consensus file.
You can read all about how Tor works by
tulations. :-)
>
> sincerely,
>
> frank
> 2010-05-27
>
> -
> sender: Dare
> sending date: 2010-05-27 15:20:59
> receiver: or-talk
> cc:
> subject: Re: Re: Bridges and China (new thread)
>
> I am using t
Dare,
congratulations. :-)
sincerely,
frank
2010-05-27
-
sender: Dare
sending date: 2010-05-27 15:20:59
receiver: or-talk
cc:
subject: Re: Re: Bridges and China (new thread)
I am using the 3rd party http proxy now
ode too?
>
> sincerely,
>
> frank
> 2010-05-27
>
> -
> sender: andrew
> sending date: 2010-05-27 11:42:55
> receiver: or-talk
> cc:
> subject: Re: Bridges and China (new thread)
>
> On Thu, May 27, 2010 at 11:21:50AM +0800, for.tor.bri...@gmail.com wrote
> 2
ut the tor directory server in https mode too?
sincerely,
frank
2010-05-27
-
sender: andrew
sending date: 2010-05-27 11:42:55
receiver: or-talk
cc:
subject: Re: Bridges and China (new thread)
On Thu, May 27, 2010 at
-05-27
-
sender: andrew
sending date: 2010-05-27 11:42:55
receiver: or-talk
cc:
subject: Re: Bridges and China (new thread)
On Thu, May 27, 2010 at 11:21:50AM +0800, for.tor.bri...@gmail.com wrote 2.7K
bytes in 67 lines about:
: >I've been told if you search
On Thu, May 27, 2010 at 11:21:50AM +0800, for.tor.bri...@gmail.com wrote 2.7K
bytes in 67 lines about:
: >I've been told if you search on baidu, you can find such bridge addresses.
: >bridge addresses are being released by blog posts, BBS posts, qq, and ads on
taobao.
: then bad guys can get and
hi, andrew,
>I've been told if you search on baidu, you can find such bridge addresses.
>bridge addresses are being released by blog posts, BBS posts, qq, and ads on
>taobao.
then bad guys can get and block them too through baidu searching,
and more, qq is totally under control of bad guys, we c
On Wed, May 26, 2010 at 08:42:12PM +0100, alpal.mailingl...@gmail.com wrote
1.2K bytes in 26 lines about:
: Is it worth adding a captcha to bridges.torproject.org? Incidentally,
: what happens when "adversaries" just block access to that site?
Is it worth adding, maybe. Most captcha systems assu
On Wed, May 26, 2010 at 3:42 PM, Al MailingList wrote:
>
> Is it worth adding a captcha to bridges.torproject.org? Incidentally,
> what happens when "adversaries" just block access to that site?
>
> How about responding to bridge request emails with a captcha style
> email attachment with the IPs
On Wed, May 26, 2010 at 4:06 PM, wrote:
> Rather than continue to hijack the old thread, here's a new one about
> bridges and china.
>
> I'm fully aware the GFW seems to have successfully crawled
> https://bridges.torproject.org and added all of those bridges into their
> blocking regime. The em
15 matches
Mail list logo