[tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

boldsuck lists at for-privacy.net
Tue Sep 24 18:56:53 UTC 2024


Toralf Förster via tor-relays wrote:
> On 9/24/24 15:40, boldsuck via tor-relays wrote:
> > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD
> > DZo6BQqwQURzjQy
> OT, but useless use of cat ;)

Oh, you're right. It's nicer because I have instance name in front of it.

grep bridge-ips /var/lib/tor-instances/*/stats/bridge-stats
/var/lib/tor-instances/45/stats/bridge-stats:bridge-ips

I still prefer to use cat for public pastebin. Less information is better. :-)

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 3872 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20240924/fb1ef21f/attachment.sig>


More information about the tor-relays mailing list