Tor network anonymity

Does a bridge hide the usage of Tor from an ISP? Say my friend wanted to run Tor 24/7 for some reason. What would the bridge and the ISP know about the connection?

POSIWID: The Purpose Of A System Is What It Does Shirt $21.68

Yakub: World's Greatest Dad Shirt $21.68

POSIWID: The Purpose Of A System Is What It Does Shirt $21.68

  1. 2 months ago
    Anonymous

    bridges are not listed publicly, so it wouldn't be *immediately* obvious that you're using a bridge without further probing.

  2. 2 months ago
    Anonymous

    *probably* not immediately but almost certainly eventually. bridges get discovered and listed in days to weeks. if you want to obscure the fact that you're using tor at all, you have to use a vpn in front of it.

    • 2 months ago
      Anonymous

      >Does a bridge hide the usage of Tor from an ISP?
      only if the bridge IP address isn't known. scraping together lists of known bridges is relatively easy for any fricking idiot so it's common that they get blocked or throttled by third world shithole nations.

      >bridges get discovered and listed in days to weeks
      i've seen reports of public bridges blocked by inbred communists in russia within an hour or so. i'm certain it happens at similar speeds in china and other shithole nations as well.

      • 2 months ago
        Anonymous

        nothing stops a government actor to continuously create circuits and ban ip addresses associated with it.

        https://stem.torproject.org/tutorials/examples/list_circuits.html

        there is probably an easier way as well. also bump.

  3. 2 months ago
    Anonymous

    Tor is so boring these days, any cool hidden service you want to share? If it's an imageboard even better.

    • 2 months ago
      Anonymous

      >any cool hidden service you want to share?
      i smell bacon and it's not breakfast yet. slow day at the station, officer piglet?

      • 2 months ago
        Anonymous

        You are you so scared of the government that your self-censor and discourage discussion. Pathetic.

        • 2 months ago
          Anonymous

          have a nice day

  4. 2 months ago
    Anonymous

    Unless you are in a shit country like Iran, Syria, China, parts of Africa, they won't know shit and won't do shit. Ignore the FUD. ISP's in non shit nations only care about exit nodes and you can prove you were running an exit node and that may be against the terms of service / acceptable use.
    https://support.torproject.org/glossary/exonerator/

    • 2 months ago
      Anonymous

      Yeah the FUD around Tor is insane, using it is perfectly legal in any civilized country.
      What do you think they're going to do? Put you on some meanie list? If you're this afraid of the government they already got a tight grip on you, and only had to spread FUD to achieve that.

      • 2 months ago
        Anonymous

        >perfectly legal
        Sounds like a version of the "I've got nothing to hide" argument to me. Even if so, why do you assume that will always be the case? And why do you assume that getting on the meanie list will not have worse consequences as the known agenda progresses further? Legality today does not imply legality tommorow.

        • 2 months ago
          Anonymous

          Are you just going to stop doing things out of fear that they will make them illegal in the future? This is exactly what I meant. They already have you under tight control.

          • 2 months ago
            Anonymous

            I'm not going to stop, I'm just wondering about this property of Tor and other systems and whether it's possible to fully hide using them. It will be a useful feature going forward.

          • 2 months ago
            Anonymous

            It's going to be pretty hard I think, due to the nature of the internet. You can hide that you're using Tor from your ISP by using a VPN, but then what if they start banning VPN's? This is why you should probably try to fight for your rights irl. Unfortunately most people are dumb and are basically cheering for more government control.

          • 2 months ago
            Anonymous

            i miss times when www meant world wide web and not sww state wide web

  5. 2 months ago
    Anonymous

    https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
    Is this good?

    • 2 months ago
      Anonymous

      i haven't used it myself yet but it seems incredibly promising - on paper. it won't be the silver bullet to stop blocking but it's a good start to make it more difficult for an adversary/third world shithole government etc.

      • 2 months ago
        Anonymous

        What stops the glow-in-the-darks from requesting these bridges and adding them to the block list? Is it possible even in theory to make a network that doesn't leak that you are connecting to it?

        • 2 months ago
          Anonymous

          >What stops the glow-in-the-darks from requesting these bridges and adding them to the block list?
          probably not much will stop them. as i said, looks good on paper, makes it more difficult but eventually they'll collect up a list and do the same thing with bridges and exit nodes.

      • 2 months ago
        Anonymous

        it certainly will make it easier to set up on home pi than running proper vps with that vless xtls shit we had earlier. so having casual friend with old pi under his bed located in Freedom Country should make it a lot easier to setup
        perhaps some IQfy friends could even attempt at helping with that, since to this date i see questions 'what do i do with my pi'
        well run tor bridge

    • 2 months ago
      Anonymous

      >More placebo to your placebo
      Yeah sure. Let me ask the gov real quick for an ETA

  6. 2 months ago
    Anonymous

    for anyone interested: https://www.hackerfactor.com/blog/index.php?/archives/892-Tor-0day-Finding-Bridges.html

    • 2 months ago
      Anonymous

      This makes the situation sound pretty grim. Is it really impossible to have an undetectable anonymity network with high levels of plausible deniability that you even used it?

      • 2 months ago
        Anonymous

        What about i2p

        • 2 months ago
          Anonymous

          recently a years old CVE was discovered in i2p that can deanonymize any host. i wonder what other ancient gems are hidden in such anonymous networks.

          https://geti2p.net/en/blog/post/2023/06/25/new_release_2.3.0

          • 2 months ago
            Anonymous

            Well there will be always bugs in any software, still there's also C++ implementation I think.

          • 2 months ago
            Anonymous

            Users of i2pd are not affected.

        • 2 months ago
          Anonymous

          i2p is peer-to-peer so the glowies can just collect their peer lists.

  7. 2 months ago
    Anonymous

    I would compromise the anonymity of her onion network

    • 2 months ago
      Anonymous

      too smelly

  8. 2 months ago
    Anonymous

    >my friend
    sure..

  9. 2 months ago
    Anonymous

    cute

  10. 2 months ago
    Anonymous

    [...]

    >writing style
    haha wow it's like I'm on nano again

Your email address will not be published. Required fields are marked *