[tor-talk] Why does requesting for bridges by email require a Yahoo or Gmail address?
isis
isis at torproject.org
Sun Jul 27 19:40:24 UTC 2014
Mirimir transcribed 1.1K bytes:
> On 07/25/2014 11:31 PM, grarpamp wrote:
>
> <SNIP>
>
> > Do we underestimate the social net in oppressed that gives
> > them awareness of tor, and to obtain binary and share bridge
> > info in the first place?
>
> Maybe we do. But what about carelessness, poor judgment and the
> prevalence of informers? Wouldn't it be better to have a system that
> protected bridges by design?
>
> > Or that oppressor will not burn $cheap govt SIM and IP army
> > to get and block bridges from gmail to @getbridges?
>
> Right. Requiring hard-to-get email addresses does make it harder to get
> bridge IPs. But who does that impact the most, potential users or
> adversaries? Is there relevant evidence?
>
> > This is difficult.
>
> Indeed.
>
> Please excuse the repetition, but DNS-based fast flux (Proximax) with
> selection-based dropping of domain names associated with bridge blocking
> is the best possibility that I've seen. Rather than trying to prevent
> adversaries from joining the system, it recursively isolates based on
> behavior.
I actually like the rBridge design better. [0]
[0]: https://people.torproject.org/~isis/papers/rBridge:%20User%20Reputation%20based%20Tor%20Bridge%20Distribution%20with%20Privacy%20Preservation.copy%20with%20notes.pdf
--
♥Ⓐ isis agora lovecruft
_________________________________________________________
GPG: 4096R/A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1154 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140727/ae0abafa/attachment.sig>
More information about the tor-talk
mailing list