[tor-bugs] #5011 [Pluggable transport]: Discuss possible designs for an external program that discovers bridge addresses to tell Tor about them
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Sat Mar 10 11:35:32 UTC 2012
#5011: Discuss possible designs for an external program that discovers bridge
addresses to tell Tor about them
---------------------------------+------------------------------------------
Reporter: karsten | Owner: mikeperry
Type: task | Status: new
Priority: normal | Milestone: Sponsor F: March 15, 2012
Component: Pluggable transport | Version:
Keywords: MikePerry201203 | Parent: #5010
Points: | Actualpoints:
---------------------------------+------------------------------------------
Comment(by rransom):
Replying to [comment:6 seaman]:
> Regarding the design of BridgeFinder, I suggest that it contains a
plugin system in order to allow different inputs. In
https://trac.torproject.org/projects/tor/ticket/5096 it is proposed to use
QR codes but I think that this should not be the only option.
#5096 is not related to this ticket.
> One problem with QR codes is that they are clearly describing something
that is hidden. So instead I propose an additional plugin that does
steganography. In more detail I'm thinking of image steganography
(although at a later stage one could add audio/video).
Don't forget about steganography in text, or just indistinguishable-from-
random bits in plain sight where the censors would expect to see bits that
they cannot afford to distinguish from random.
Also, this ticket isn't about writing a 'BridgeFinder' itself; it's about
designing the interface that every BridgeFinder should use to tell Tor
about a bridge.
> The basic idea:
> A list of bridge addresses get sent to a trusted person. This person
encodes the bridge addresse(s) into an image and sends them to a friend.
This friend then decodes the bridge address contained in the image and
uses it to connect to TOR (via BridgeFinder).
`s/TOR/Tor/`
> A bit more specific:
> # The encoding will not alter the image signficantly so that it appears
to be a valid unsuspicious data exchange (e.g. a holiday snapshot, avatar,
signature).
> # To encode the image a password needs to be entered that is known by
both ends. Password suggestion:
> # # a complex password known by both parties
There are easier ways than image steganography to transmit a piece of
information to a user using a pre-shared secret.
> # # name of a significant object in the image (this would allow external
people easier access, on the other hand it would also allow the use of
image sharing websites and blogs, automatic algorithms (object detection)
to treat large amounts of images would be difficult).
This raises the issue that different people will describe an image (or an
object in an image) using different texts.
> # The decoding process must be computationally expensive in order to
avoid dictonary attacks.
> # The algorithm for decoding contains automatic error correction as well
as data verification.
>
> Let me know what you think about this idea. If it is worth pursuing I
can do the coding.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5011#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list