Re: [tor-relays] Experience with obfuscated bridge on Raspberry Pi Raspian

2013-08-20 Thread z0rc
On 20/08/13 12:01, Kostas Jakeliunas wrote: Do you remember where you did hear this? Was it in writing, are you by chance maybe able to link to it? It would be interesting to know more. Hi, It was actually on this list a few weeks ago. Paul Staroch was contacted by the German authorities for

[tor-relays] Upgrading an obfsbridge to the latest alpha on git master, on raspberry pi

2013-08-20 Thread Kostas Jakeliunas
A few days ago, George posted an invitation for obfsproxy operators to upgrade their Tor software to the latest version on the master branch in the Tor git repo. [1] I'm running a low traffic obfsbridge on a raspberry pi, the whole thing is rather experimental in its nature already, so decided to

Re: [tor-relays] Experience with obfuscated bridge on Raspberry Pi Raspian

2013-08-20 Thread irregulator
Hello. I don't think you will be raided for running a non-exit Tor relay. Especially, if you run a bridge, since bridges are not public, are not mentioned in consensus. Even if an oppressive regime scans the internet for bridges, in order to block its citizens from accessing it, i don't think you'l

Re: [tor-relays] Experience with obfuscated bridge on Raspberry Pi Raspian

2013-08-20 Thread TonyXue
>China's internet censorship / 'firewall' thing seems to have been trying to >enumerate bridges for a while now. Yes, it does. I guess it's actually >detecting bridges from users. The bridges become 'one-off', you can only use >those bridges one time(at least in a period of time) and the second

Re: [tor-relays] Experience with obfuscated bridge on Raspberry Pi Raspian

2013-08-20 Thread Kostas Jakeliunas
Thanks for sharing your experience! > After the week I decided to shut the bridge down because I heard from people being contacted by the police even though only running a non-exit relay. Do you remember where you did hear this? Was it in writing, are you by chance maybe able to link to it? It wo