On 10/03/2018 04:36 AM, ithor wrote:
> Ok, so basically I have to stick with trust... kinda dangerous really in my
> geographical location.
>
> I know there's a lot of talk about the pro and contra of using some kind of
> VPN before entering the Tor network, how it can deanonymize you and how yo
Ok, so basically I have to stick with trust... kinda dangerous really in my
geographical location.
I know there's a lot of talk about the pro and contra of using some kind of VPN
before entering the Tor network, how it can deanonymize you and how you
basically still have to trust someone.
But
On Wed, 03 Oct 2018 08:41:29 +, ithor wrote:
...
> So would there be a way to (pen-?)test a private obfs4 bridge as being non
> blacklisted and actually usable without really trying to connect to it and
> alarming my ISP and DPI the like ?
Obviously not. To test that you need to try to conne
hosted outside of your country geographically?
- Original Message -
From: ithor [mailto:it...@protonmail.com]
Sent: Wednesday, October 03, 2018 09:41 AM
To: tor-talk@lists.torproject.org
Subject: [tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?
Hi,
when living under
Hi,
when living under an oppressive regime with draconian Internet censorship, it
is crucial for me to be able to connect to the Tor network without arousing any
suspicion and to be sure I'm not connecting to a malicious entry-node or obfs4
bridge.
The only way for me to bypass DPI is to use eit