Rilasciata #Tails 6.18: oltre all’introduzione dei ponti #WebTunnel include aggiornamenti significativi per 2 strumenti fondamentali: #Tor Browser e #Thunderbird.
Questa distribuzione è progettata per preservare la #privacy e l#anonimato. Utilizzato la sua capacità di operare esclusivamente in memoria RAM per non lasciare tracce sul computer
@torproject Q: I wish there was a similar tool test #Bridges, as https://bridges.torproject.org/scan/ is not that good and I don't want to hammer it with dozens of addresses, cuz at best that's quite antisocial if not possibly trigger responses assuming this is an intelligence gathering operation.
I.e.
bridgetest -v4 obfs4 203.0.113.0:80 …
bridgetest -v6 webtunnel [2001:DB8::1]:443 …
bridgetest -list ./tor.bridges.list.private.tsv
Similarly there needs to be a more granular way to request #TorBridges from #BridgeDB (as it's basically impossible to get #IPv4 #Webtunnel addresses nor is there an option to filter for #ports like :80
& :443
to deal with restrictive #firewalls (i.e. on public #WiFi)…
ipv6=yes
but neither ipv4=yes
nor ipv6=no
yielded me other resultd than #IPv6 webtunnel
bridges…And before anyone asks: Yes, I do have a "legitimate purpose" as some of my contacts do need Bridges to get beyond a mandatory firewall and/or do use #TorBrowser (through an #SSH tunnel) to circumvent Tor & #VPN blocks and maintain privacy (as many companies do block sometimes entire #Hosters' ASNs due to rampant #scrapers…
@tails_live @tails @torproject plus support for meek
, snowflake
, webtunnel
and non-#obfs4 #Bridges seems missing in #Tails.
Cuz to this day I've to yet see an IPv4-#webtunnel #bridge…
The Tor Project celebrates a major victory against online censorship, deploying its 300th WebTunnel bridge! This milestone expands internet access in censored regions by disguising Tor traffic as regular web activity. Learn how this helps bypass restrictions: [https://cyberinsider.com/tor-celebrates-300th-webtunnel-bridge-milestone-in-fight-against-censorship/] #TorProject #WebTunnel #Censorship #InternetFreedom
#newz
Right now the problem with @torproject #BridgeDB is that I can't get #webtunnel bridges on #IPv4 even when I try to specify those by setting ipv6=no
at the URL:
https://bridges.torproject.org/bridges?transport=webtunnel&ipv6=no
And no, removing IPv6 from the URL doesn't yield any IPv4 results either.
https://bridges.torproject.org/bridges?transport=webtunnel
It would be better if #BridgeDB would have a radio button / switch to choose IPv4 & #IPv6 for this reason.
#WhatsMissing: A tool to check if #TorBridges are still available/online/reachable that one can use either #standalone (with #TorBrowser and/or #Tor Expert Bundle) or on @tails_live / @tails / #Tails.
Whilst I do acknowledge that @torproject do disrecommend having a huge list of Tor Bridges on hand, I do regularly need them for contacts who are behind a #GreatFirewall and can't #SSH-Tunnel out of it.
Espechally being able to filter for #IPv4only and not just #IPv6only is something I miss, alongside the filter for #PluggableTransports type as @guardianproject #Orbot seems to only handle #obfs4 and not webtunnel or #meek at all...
@wmd @miqokin I've yet to find a nation that criminalizes @torproject but not #VPN|s that facilitate the same...
Whereas #Tor has multiple ways to circumvent #InternetCensorship, includibg multiple #proxy & 9bfuscation systems like #obfs4, #meek, #webtunnel and regular #TorBridges on included, public query-able amd private lists...
#MastoAdmins's can easily help the #Tor network by installing the Tor daemon on the linux server and configuring their web server to be a #WebTunnel bridge
disobey.net does it (https://metrics.torproject.org/rs.html#details/7E12D6CACBA1051FD23A48482E091257CD4701BC), you can too!
"Hiding in plain sight: Introducing WebTunnel"
https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/