[tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.
boldsuck
lists at for-privacy.net
Tue Sep 24 18:56:53 UTC 2024
Toralf Förster via tor-relays wrote:
> On 9/24/24 15:40, boldsuck via tor-relays wrote:
> > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD
> > DZo6BQqwQURzjQy
> OT, but useless use of cat ;)
Oh, you're right. It's nicer because I have instance name in front of it.
grep bridge-ips /var/lib/tor-instances/*/stats/bridge-stats
/var/lib/tor-instances/45/stats/bridge-stats:bridge-ips
I still prefer to use cat for public pastebin. Less information is better. :-)
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 3872 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20240924/fb1ef21f/attachment.sig>
More information about the tor-relays
mailing list