The Tor Project celebrates a major victory against online censorship, deploying its 300th WebTunnel bridge!
The Tor Project celebrates a major victory against online censorship, deploying its 300th WebTunnel bridge!
Over the next few days, we will respond to bridge operators who have enrolled in the WebTunnel campaign to send Tor t-shirts and stickers.
If you have set up your bridges but haven't reached out to us, please email frontdesk@torproject.org using the same email address associated with your bridge contact information.
More info
https://blog.torproject.org/fighting-censorship-with-webtunnel/
#tor #webtunnel #censorship
Right now the problem with @torproject #BridgeDB is that I can't get #webtunnel bridges on #IPv4 even when I try to specify those by setting ipv6=no
at the URL:
https://bridges.torproject.org/bridges?transport=webtunnel&ipv6=no
And no, removing IPv6 from the URL doesn't yield any IPv4 results either.
https://bridges.torproject.org/bridges?transport=webtunnel
It would be better if #BridgeDB would have a radio button / switch to choose IPv4 & #IPv6 for this reason.
#WhatsMissing: A tool to check if #TorBridges are still available/online/reachable that one can use either #standalone (with #TorBrowser and/or #Tor Expert Bundle) or on @tails_live / @tails / #Tails.
Whilst I do acknowledge that @torproject do disrecommend having a huge list of Tor Bridges on hand, I do regularly need them for contacts who are behind a #GreatFirewall and can't #SSH-Tunnel out of it.
Espechally being able to filter for #IPv4only and not just #IPv6only is something I miss, alongside the filter for #PluggableTransports type as @guardianproject #Orbot seems to only handle #obfs4 and not webtunnel or #meek at all...
@wmd @miqokin I've yet to find a nation that criminalizes @torproject but not #VPN|s that facilitate the same...
Whereas #Tor has multiple ways to circumvent #InternetCensorship, includibg multiple #proxy & 9bfuscation systems like #obfs4, #meek, #webtunnel and regular #TorBridges on included, public query-able amd private lists...
#MastoAdmins's can easily help the #Tor network by installing the Tor daemon on the linux server and configuring their web server to be a #WebTunnel bridge
disobey.net does it (https://metrics.torproject.org/rs.html#details/7E12D6CACBA1051FD23A48482E091257CD4701BC), you can too!
"Hiding in plain sight: Introducing WebTunnel"
https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
@ActuallyAubrey That depends on the juristiction in question, the plan & provider in question as well as used hardware in question.
Consider telephony & SMS inherently & unfixably insecure.
OFC a maliciously configured CPE/Router can log & report all pachets that travel through, but #DNS & #HTTP or any unencrypted comms are susceptible.
@dragonarchitect @DeltaWye this also is the advantage of #TCPIP: Only the #endpoints need to be able to reach each other: All the complicated #Routing is transparent and thus changing routes don't result in lost connections.