[tor-bugs] #32026 [Circumvention/Censorship analysis]: Using An Alternative To TCP To Avoid Packet Injection?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Oct 11 23:30:56 UTC 2019
#32026: Using An Alternative To TCP To Avoid Packet Injection?
-----------------------------------------------+------------------------
Reporter: Aphrodites1995 | Owner: (none)
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Circumvention/Censorship analysis | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------------+------------------------
Comment (by arma):
Replying to [comment:3 dcf]:
> In China, it's some combination of at least the following techniques:
> * Running middle nodes and recording the addresses that connect to
them.
Wow, is this one thought to actually be happening? Citation or details? :)
If so, we could conceivably run some private obfs4 bridges and connect to
public relays in an ordered fashion to figure out which ones are watching,
"bad relays trap" style.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32026#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list