Sorry. Here is a clarification: our http and email bots "worked" well. We
have stopped those bots for quite a while and have no plan to make them run
again. I also realized email distribution is necessary for some people. So a
challenge-response mechanism can be necessary too against bots. However,
We have implemented the http and email bots, which are working well without
much human labor work.
I'd recommend CATCHA to be implemented on the bridge http server. The email
server should have at least a challenge-response mechanism. However, this
challenge-response mechanism helps only a little
On 20 July 2010 03:14, Moritz Bartl wrote:
>
> Speaking on behalf of a good, blind friend: This is not true. Unless you
> consider him "not normal".
>
I don't want to get into the intricacies of interface design, and ableism,
but some points of note:
-blind people are not normal: they suffer from
Hi,
And it would be little affection to normal users.
Speaking on behalf of a good, blind friend: This is not true. Unless you
consider him "not normal".
Spontaneuous idea: I think it might be interesting to use a fingerprint
similar to the one caculated by Panopticlick to limit/influence
On Mon, Jul 19, 2010 at 5:17 PM, wrote:
> On Mon, Jul 19, 2010 at 12:12:48AM +0800, moses.ma...@gmail.com wrote 1.0K
> bytes in 27 lines about:
> : Could you guys add a CAPTCHA test for the bridges page
> : https://bridges.torproject.org/ ? It is almost certain that bridges
> : are crawled, anal
On Mon, Jul 19, 2010 at 12:12:48AM +0800, moses.ma...@gmail.com wrote 1.0K
bytes in 27 lines about:
: Could you guys add a CAPTCHA test for the bridges page
: https://bridges.torproject.org/ ? It is almost certain that bridges
: are crawled, analyzed and blocked by bots now.
This is on the short-
Hi,
Could you guys add a CAPTCHA test for the bridges page
https://bridges.torproject.org/ ? It is almost certain that bridges
are crawled, analyzed and blocked by bots now.
It would also be appreciated if bridges replied via email are *not*
wrote in plain text, which is also very easy analyzed b
Tor 0.2.2.14-alpha greatly improves client-side handling of circuit build
timeouts, which are used to estimate speed and improve performance. We
also move to a much better GeoIP database, port Tor to Windows CE,
introduce new compile flags that improve code security, add an eighth
v3 directory auth
8 matches
Mail list logo