What is preventing an attacker to start up a few mid-nodes and enumerating all IPs and substracting those from the list of publicly known entry-nodes to get a list of (all) unlisted bridges?
Seems a lot cheaper than dpi and except for a few false positives due to bots pinging it should be quite accurate is this an inherent and known flaw to the bridge infrastructure that we have to live with or am i missing some keypoint? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk