Hi,
I am writing this message to make a simple suggestion that could help
driving more adoption to Tor by making using tor less obvious for a network
administrator.
This suggestion tries to address the user case of a common Tor usage, in
which the user is not being attacked nor mitm, he is just us
Why would someone get into trouble for using Tor?
Furthermore, have you have heard of pluggable transports for Tor?
On Sat, Jan 16, 2016 at 1:31 PM, Raúl Martínez wrote:
> Hi,
> I am writing this message to make a simple suggestion that could help
> driving more adoption to Tor by making using to
Most of people are uneducated about what is Tor and what is used for. That
can lead to trouble.
I have used pluggable transports but they are too slow (50KB/s)
2016-01-16 15:00 GMT+01:00 David Stainton :
> Why would someone get into trouble for using Tor?
> Furthermore, have you have heard of pl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Well, you are forgetting that all TOR relays are using an IP, and these IP's
are stored in a public list.
So you do not have to check your logs as a network admin, you just have to
download the list every 24H and wright and a simple script (and mak
On Sat, 16 Jan 2016 15:02:18 +0100
Raúl Martínez wrote:
> Most of people are uneducated about what is Tor and what is used for.
> That can lead to trouble.
>
> I have used pluggable transports but they are too slow (50KB/s)
So run your own fast bridge? It's relatively easy, and I assume that's
On 01/16/2016 05:20 AM, Elrippo wrote:
> Well, you are forgetting that all TOR relays are using an IP, and these IP's
> are stored in a public list.
> So you do not have to check your logs as a network admin, you just have to
> download the list every 24H and wright and a simple script (and make