Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Wednesday, October 3, 2018 4:25 PM, Andreas Krey wrote:
> On Wed, 03 Oct 2018 13:03:14 +0000, ithor wrote:
> ...
>
> > Can you elaborate upon that for the noob I am. If i understand you
> > correct
than Marquardt
wrote:
> On Wed, Oct 03, 2018 at 12:25:52PM +, ithor wrote:
>
> > So a meek request is sent in clear-text. What exact information is given ?
> > The exact ip address of the Azure server, its geolocation ?
>
> The IP address of the Azure server you're
Or they don't want to ruin their standing with the client who
has the name that is used in the SNI (and who takes the loss
when china should decide to block that b/c it's used by fronters).
Can you elaborate upon that for the noob I am. If i understand you correctly,
when using domain fronting, T
wrote:
> On Wed, Oct 03, 2018 at 08:38:52AM +, ithor wrote:
>
> > ever since TBB 8, there's the new moat way to obtain private obfs4 bridges
> > through a CAPTCHA. In the following webpage it's stated meek is used in
> > order to communicate with the Tor bridg
r a obfs4 bridge.
‐‐‐ Original Message ‐‐‐
On Wednesday, October 3, 2018 10:23 AM, Andreas Krey wrote:
> On Wed, 03 Oct 2018 08:41:29 +, ithor wrote:
> ...
>
> > So would there be a way to (pen-?)test a private obfs4 bridge as being non
> > blacklisted and actual
Hi,
when living under an oppressive regime with draconian Internet censorship, it
is crucial for me to be able to connect to the Tor network without arousing any
suspicion and to be sure I'm not connecting to a malicious entry-node or obfs4
bridge.
The only way for me to bypass DPI is to use eit
Hi,
ever since TBB 8, there's the new moat way to obtain private obfs4 bridges
through a CAPTCHA. In the following webpage it's stated meek is used in order
to communicate with the Tor bridges database. Now, my question is : which ones
? In my country, domain fronting for Amazon and Google are