On 20/08/13 12:01, Kostas Jakeliunas wrote:
Do you remember where you did hear this? Was it in writing, are you by
chance maybe able to link to it? It would be interesting to know more.
Hi,
It was actually on this list a few weeks ago. Paul Staroch was contacted
by the German authorities for
A few days ago, George posted an invitation for obfsproxy operators to
upgrade their Tor software to the latest version on the master branch in
the Tor git repo. [1]
I'm running a low traffic obfsbridge on a raspberry pi, the whole thing is
rather experimental in its nature already, so decided to
Hello. I don't think you will be raided for running a non-exit Tor
relay. Especially, if you run a bridge, since bridges are not public,
are not mentioned in consensus. Even if an oppressive regime scans the
internet for bridges, in order to block its citizens from accessing it,
i don't think you'l
>China's internet censorship / 'firewall' thing seems to have been trying to
>enumerate bridges for a while now. Yes, it does. I guess it's actually
>detecting bridges from users. The bridges become 'one-off', you can only use
>those bridges one time(at least in a period of time) and the second
Thanks for sharing your experience!
> After the week I decided to shut the bridge down because I heard from
people being contacted by the police even though only running a non-exit
relay.
Do you remember where you did hear this? Was it in writing, are you by
chance maybe able to link to it? It wo