[tor-relays] Suggestion to make Tor usage more disguised

2016-01-16 Thread Raúl Martínez
Hi, I am writing this message to make a simple suggestion that could help driving more adoption to Tor by making using tor less obvious for a network administrator. This suggestion tries to address the user case of a common Tor usage, in which the user is not being attacked nor mitm, he is just us

Re: [tor-relays] Suggestion to make Tor usage more disguised

2016-01-16 Thread David Stainton
Why would someone get into trouble for using Tor? Furthermore, have you have heard of pluggable transports for Tor? On Sat, Jan 16, 2016 at 1:31 PM, Raúl Martínez wrote: > Hi, > I am writing this message to make a simple suggestion that could help > driving more adoption to Tor by making using to

Re: [tor-relays] Suggestion to make Tor usage more disguised

2016-01-16 Thread Raúl Martínez
Most of people are uneducated about what is Tor and what is used for. That can lead to trouble. I have used pluggable transports but they are too slow (50KB/s) 2016-01-16 15:00 GMT+01:00 David Stainton : > Why would someone get into trouble for using Tor? > Furthermore, have you have heard of pl

Re: [tor-relays] Suggestion to make Tor usage more disguised

2016-01-16 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Well, you are forgetting that all TOR relays are using an IP, and these IP's are stored in a public list. So you do not have to check your logs as a network admin, you just have to download the list every 24H and wright and a simple script (and mak

Re: [tor-relays] Suggestion to make Tor usage more disguised

2016-01-16 Thread Yawning Angel
On Sat, 16 Jan 2016 15:02:18 +0100 Raúl Martínez wrote: > Most of people are uneducated about what is Tor and what is used for. > That can lead to trouble. > > I have used pluggable transports but they are too slow (50KB/s) So run your own fast bridge? It's relatively easy, and I assume that's

Re: [tor-relays] Suggestion to make Tor usage more disguised

2016-01-16 Thread Jesse V
On 01/16/2016 05:20 AM, Elrippo wrote: > Well, you are forgetting that all TOR relays are using an IP, and these IP's > are stored in a public list. > So you do not have to check your logs as a network admin, you just have to > download the list every 24H and wright and a simple script (and make