On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K bytes in 16 lines about: : Forgive my ignorance but why would there be any need to inspect : packets for tunnels? Would the authorities not just ask every ISP : to monitor the IPs to which their clients are connecting and if they : are Tor nodes then the client must be reported. AIUI all the ISP : can see is that a connection is made to the first Tor node.
Because encryption is illegal, not ip addresses and port combinations. At the most basic level, they could just block tcp 443 and probably stop the most customers with that alone. If the ISPs really care, then deep packet inspection is the next probability to detect and block anything the dpi device claims is encrypted traffic. Bridges aren't public tor relays. So comparing a list of public tor relays and trying to catch bridge users will not work. -- Andrew pgp key: 0x74ED336B _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk