> On 22 Aug 2018, at 02:16, Nathaniel Suchy wrote:
>
> Couldn't I firewall the non-obfs port so only looback addresses may access it?
For a private or hard-coded bridge, you can firewall your ORPort and set:
AssumeReachable 1
Public BridgeDB bridges need an ORPort to pass bridge authority
Imagine if Cloudflare adds CAPTCHAs to Onion services. Now that’d be
something
On Tue, Aug 21, 2018 at 1:18 PM grarpamp wrote:
> On Mon, Aug 20, 2018 at 7:19 PM, Alec Muffett
> wrote:
> > Even if Cloudflare onionified a bazillion domain names, there are still
> only
> > a few million people
Hi everyone,
Tor Browser 8 Alpha includes the Snowflake PT as it comes near a final
release, the adoption and usage of the Snowflake PT will continue to rise.
I now have the following questions...
1) Will a command line tool like an obfs4proxy come out so those of us with
infrastructure can run
Would you like to trial a FreeBSD Relay on Cogent until October 1st?
Yes, it has to be FreeBSD, because I use Bhyve as my hypervisor and some of my
blades don’t support UG, which means, I support FreeBSD only on these series of
servers.
If you’re interested in a Model “A” (25GB HDD, 1vCPU, 2GB
On Mon, Aug 20, 2018 at 7:19 PM, Alec Muffett wrote:
> Even if Cloudflare onionified a bazillion domain names, there are still only
> a few million people who use Tor who could generate the load to connect to
> them.
And none of those who could, will, because cloudflare will
google recaptcha
Hi David,
Couldn't I firewall the non-obfs port so only looback addresses may access
it?
Cordially,
Nathaniel Suchy
On Tue, Aug 21, 2018 at 11:37 AM David Fifield
wrote:
> On Mon, Aug 20, 2018 at 02:25:40PM -0400, Nathaniel Suchy wrote:
> > Interesting. Is there any reason to not use an
On Mon, Aug 20, 2018 at 02:25:40PM -0400, Nathaniel Suchy wrote:
> Interesting. Is there any reason to not use an obfuscated bridge?
No, not really. obfs4 resists active probing without any special
additional steps. But I can think of one reason why the MSS trick is
worth trying, anyway. Due to a
> On 21 Aug 2018, at 07:39, DaKnOb wrote:
>
> Cloudflare had a post yesterday[1] on their blog[2] that said they have about
> 10,000,000 domain names using their service. So that’s a rough number of the
> maximum number of websites that will be made available over Tor. Now in
> reality I
On Tue, 21 Aug 2018 06:53:00 +
Georg Koppen wrote:
> nusenu:
> >
> >
> > Nathaniel Suchy:
> >> As some of you may have heard, Cloudflare is beta testing opportunistic
> >> onions. This of course is going to create more Tor traffic. Cloudflare has
> >> several concerns about running their
On Tue, 21 Aug 2018 at 07:09, DaKnOb wrote:
> Also, I don’t think Cloudflare spent so much time in engineering, just to
take down Tor..
I've known people at Cloudflare talking about doing something like this for
2+ years, and the goal has been to do something nice for Tor and to make it
easier
10 matches
Mail list logo