On 11/8/2016 2:45 PM, COLLIER Ben wrote:
Hello all,
Greetings from (currently freezing cold) Scotland. I'm a researcher at the University of
Edinburgh studying antisurveillance technologies, software development and how these are
shaped at different levels by ideas about crime and
Jason Long writes:
> How can I find a good list of secure Bridge?
Go here for more information.
https://www.torproject.org/docs/bridges#FindingMore
Sounds like meek might work best for your scenario, so in that case you'd
want to "Send an email to brid...@bridges.torproject.org with "get
Hello all,
Greetings from (currently freezing cold) Scotland. I'm a researcher at the
University of Edinburgh studying antisurveillance technologies, software
development and how these are shaped at different levels by ideas about crime
and surveillance. I'd describe my work as criminological
Hello all,
Greetings from (currently freezing cold) Scotland. I'm a researcher at the
University of Edinburgh studying antisurveillance technologies, software
development and how these are shaped at different levels by ideas about crime
and surveillance. I'd describe my work as criminological
I think that I should rephrase myself a little so I don’t cause any confusion.
"Undetectable" is perhaps an overstatement. Usage of bridges like meek are
especially difficult to identify by just being a firewall/router admin
sniffing bypassing traffic.
But some adversaries (we know China does
Hi, all! There is a new alpha release of the Tor source code, with
numerous bugfixes. We're getting closer to stable, but we still need
testing!
You can download the source from the usual place on the website.
Packages should be up within a few days.
Please remember to check the signature.
How can I find a good list of secure Bridge?
On Tuesday, November 8, 2016 1:38 PM, Jonathan Marquardt
wrote:
One thing should be clear:
If one is not using a bridge, it is trivial for any network observer
(University firewall admin, Iran ISP) to see if one is using
On 08/11/16 11:08, Thomas wrote:
To my knowledge Tor Browser has its own torrc file.
See here:http://www.wikihow.com/Set-a-Specific-Country-in-a-Tor-Browser
Thomas
I totally missed this, thanks for sorting me out!
Izak
--
Grinnikend door het leven...
--
tor-talk mailing list -
One thing should be clear:
If one is not using a bridge, it is trivial for any network observer
(University firewall admin, Iran ISP) to see if one is using Tor. However,
with the right bridge setup such a detection can ultimately be prevented. I
guess meek is the best candidate for an