On Wed, Feb 15, 2017, at 01:32 PM, BVpTuvb AVMV wrote: > What is preventing an attacker to start up a few mid-nodes and > enumerating all IPs and substracting those from the list of publicly > known entry-nodes to get a list of (all) unlisted bridges? > > Seems a lot cheaper than dpi and except for a few false positives due to > bots pinging it should be quite accurate is this an inherent and known > flaw to the bridge infrastructure that we have to live with or am i > missing some keypoint? > -- Bridges are indistinguishable from clients, of which there are millions.
-- http://www.fastmail.com - A no graphics, no pop-ups email service -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk