#28496: Consider dropping yahoo from the bridgedb email domains ------------------------------------------+--------------------------- Reporter: arma | Owner: dgoulet Type: enhancement | Status: assigned Priority: Medium | Milestone: Component: Obfuscation/BridgeDB | Version: Severity: Normal | Resolution: Keywords: anti-censorship-roadmap-2019 | Actual Points: Parent ID: | Points: 1 Reviewer: | Sponsor: Sponsor19 ------------------------------------------+---------------------------
Comment (by cohosh): This is related to an issue brought up by pili recently due to conversation in #tor. A bridge user was complaining that the accepted email providers required giving up personal information (a phone number) in order to make an account so they could get bridges. I wonder if it's possible to assess what kind of sybil detection each of these providers have? For example, they might also be doing it by IP address which would be transparent to us but still effective (though maybe not against an ISP that access to many IPs). Somewhat relatedly, we could do tests as partially described in our obfs4 testing ticket ##29279 that check how quickly the bridges handed out via different providers and different methods are being enumerated in a few target regions. I think this would give us information separate from #9316. This would be a good thing to do consistently I think, both before and after we make changes to how we do our distribution. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28496#comment:7> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs