On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K bytes in 
16 lines about:
: Forgive my ignorance but why would there be any need to inspect
: packets for tunnels?  Would the authorities not just ask every ISP
: to monitor the IPs to which their clients are connecting and if they
: are Tor nodes then the client must be reported.  AIUI all the ISP
: can see is that a connection is made to the first Tor node.
Because encryption is illegal, not ip addresses and port combinations.
At the most basic level, they could just block tcp 443 and probably
stop the most customers with that alone. If the ISPs really care, then
deep packet inspection is the next probability to detect and block
anything the dpi device claims is encrypted traffic.

Bridges aren't public tor relays. So comparing a list of public tor
relays and trying to catch bridge users will not work.

-- 
Andrew
pgp key: 0x74ED336B
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to