Does a bridge hide the usage of Tor from an ISP? Say my friend wanted to run Tor 24/7 for some reason. What would the bridge and the ISP know about the connection?
Does a bridge hide the usage of Tor from an ISP? Say my friend wanted to run Tor 24/7 for some reason. What would the bridge and the ISP know about the connection?
bridges are not listed publicly, so it wouldn't be *immediately* obvious that you're using a bridge without further probing.
*probably* not immediately but almost certainly eventually. bridges get discovered and listed in days to weeks. if you want to obscure the fact that you're using tor at all, you have to use a vpn in front of it.
>Does a bridge hide the usage of Tor from an ISP?
only if the bridge IP address isn't known. scraping together lists of known bridges is relatively easy for any fricking idiot so it's common that they get blocked or throttled by third world shithole nations.
>bridges get discovered and listed in days to weeks
i've seen reports of public bridges blocked by inbred communists in russia within an hour or so. i'm certain it happens at similar speeds in china and other shithole nations as well.
nothing stops a government actor to continuously create circuits and ban ip addresses associated with it.
https://stem.torproject.org/tutorials/examples/list_circuits.html
there is probably an easier way as well. also bump.
Tor is so boring these days, any cool hidden service you want to share? If it's an imageboard even better.
>any cool hidden service you want to share?
i smell bacon and it's not breakfast yet. slow day at the station, officer piglet?
You are you so scared of the government that your self-censor and discourage discussion. Pathetic.
have a nice day
Unless you are in a shit country like Iran, Syria, China, parts of Africa, they won't know shit and won't do shit. Ignore the FUD. ISP's in non shit nations only care about exit nodes and you can prove you were running an exit node and that may be against the terms of service / acceptable use.
https://support.torproject.org/glossary/exonerator/
Yeah the FUD around Tor is insane, using it is perfectly legal in any civilized country.
What do you think they're going to do? Put you on some meanie list? If you're this afraid of the government they already got a tight grip on you, and only had to spread FUD to achieve that.
>perfectly legal
Sounds like a version of the "I've got nothing to hide" argument to me. Even if so, why do you assume that will always be the case? And why do you assume that getting on the meanie list will not have worse consequences as the known agenda progresses further? Legality today does not imply legality tommorow.
Are you just going to stop doing things out of fear that they will make them illegal in the future? This is exactly what I meant. They already have you under tight control.
I'm not going to stop, I'm just wondering about this property of Tor and other systems and whether it's possible to fully hide using them. It will be a useful feature going forward.
It's going to be pretty hard I think, due to the nature of the internet. You can hide that you're using Tor from your ISP by using a VPN, but then what if they start banning VPN's? This is why you should probably try to fight for your rights irl. Unfortunately most people are dumb and are basically cheering for more government control.
i miss times when www meant world wide web and not sww state wide web
https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
Is this good?
i haven't used it myself yet but it seems incredibly promising - on paper. it won't be the silver bullet to stop blocking but it's a good start to make it more difficult for an adversary/third world shithole government etc.
What stops the glow-in-the-darks from requesting these bridges and adding them to the block list? Is it possible even in theory to make a network that doesn't leak that you are connecting to it?
>What stops the glow-in-the-darks from requesting these bridges and adding them to the block list?
probably not much will stop them. as i said, looks good on paper, makes it more difficult but eventually they'll collect up a list and do the same thing with bridges and exit nodes.
it certainly will make it easier to set up on home pi than running proper vps with that vless xtls shit we had earlier. so having casual friend with old pi under his bed located in Freedom Country should make it a lot easier to setup
perhaps some IQfy friends could even attempt at helping with that, since to this date i see questions 'what do i do with my pi'
well run tor bridge
>More placebo to your placebo
Yeah sure. Let me ask the gov real quick for an ETA
for anyone interested: https://www.hackerfactor.com/blog/index.php?/archives/892-Tor-0day-Finding-Bridges.html
This makes the situation sound pretty grim. Is it really impossible to have an undetectable anonymity network with high levels of plausible deniability that you even used it?
What about i2p
recently a years old CVE was discovered in i2p that can deanonymize any host. i wonder what other ancient gems are hidden in such anonymous networks.
https://geti2p.net/en/blog/post/2023/06/25/new_release_2.3.0
Well there will be always bugs in any software, still there's also C++ implementation I think.
Users of i2pd are not affected.
i2p is peer-to-peer so the glowies can just collect their peer lists.
I would compromise the anonymity of her onion network
too smelly
>my friend
sure..
cute
>writing style
haha wow it's like I'm on nano again