On Saturday, September 10, 2011 9:55 PM, and...@torproject.org wrote: > On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K > bytes in 16 lines about: > : Forgive my ignorance but why would there be any need to inspect > : packets for tunnels? Would the authorities not just ask every ISP > : to monitor the IPs to which their clients are connecting and if they > : are Tor nodes then the client must be reported. AIUI all the ISP > : can see is that a connection is made to the first Tor node. > > Because encryption is illegal, not ip addresses and port combinations. > At the most basic level, they could just block tcp 443 and probably > stop the most customers with that alone. If the ISPs really care, then > deep packet inspection is the next probability to detect and block > anything the dpi device claims is encrypted traffic. > > Bridges aren't public tor relays. So comparing a list of public tor > relays and trying to catch bridge users will not work., > tor-talk@lists.torproject.org > > -- > Andrew
Does that mean even though Pakistan has banned encrypted traffic that Tor can still work because users are connecting by way of bridges? > pgp key: 0x74ED336B > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- http://www.fastmail.fm - Does exactly what it says on the tin _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk