Or just block datacenter addresses /16s entirely and only allow whitelisted
home/business ISPs. Google has the technical staff to make such a draconian
approach possible.
Cordially,
Nathaniel Suchy (they/them)
Sent from ProtonMail Mobile
On Sun, Mar 8, 2020 at 7:22 PM, Mirimir wrote:
> On 03
Where is this documented?
Cordially,
Nathaniel Suchy (they/them)
Sent from ProtonMail Mobile
On Sun, Mar 8, 2020 at 5:21 PM, Ben Tasker wrote:
> The canary domain will only disable DoH if you've been defaulted into using
> DoH.
>
> If you've actively turned it on, or set network.trr.mode to 3
Several places, but the main user/admin facing doc is probably this one -
https://support.mozilla.org/en-US/kb/configuring-networks-disable-dns-over-https
> Networks can signal to Firefox that there are special features such as
these in place that would be disabled if DoH were used for domain name
Mirimir:
> On 03/08/2020 02:40 PM, nusenu wrote:
>>> What would stop a bad actor from creating a bunch of new circuits and
>>> making all Tor IPs look bad if they were so inclined?
>>
>> yes there are distribution strategies that can prevent that
>> or make that very expensive (an /48 IPv6 block