Hi, Qubes might not be the best Choice here.
But if you want to browse safely in the CLEARNET i would recommend a VPN
Provider you can trust. https://thatoneprivacysite.net/
For Countries like China there is a Stealth VPN Option (OpenVPN over SSL or
SSH) that works with the DPI in China.
If you want to visit also .onion sites you can Enter on your Tor Browser "a
Bridge you trust." https://tb-manual.torproject.org/bridges/
Search Bridges over https://metrics.torproject.org/rs.html#advanced
Or search https://lmgtfy.com/?q=tor+browser+over+vpn+=1=d
https://lmgtfy.com/?q=tor+browser+over+vpn+=d
https://lmgtfy.com/?q=tor+browser+over+vpn+=d
https://lmgtfy.com/?q=tor+browser+over+vpn+=d
https://lmgtfy.com/?q=tor+browser+over+vpn+=d
https://lmgtfy.com/?q=tor+browser+over+vpn+=d
Am Dienstag, 26. Mai 2020 15:39:27 UTC+2 schrieb Catacombs:
>
> Not sure if Qubes Users is the best place to bring this up.
>
> As I look at the various means to get on the Internet, in risky situations:
> Public WiFi.
> Hotels.
> A country which is involved in spying on its citizens.
>
> I notice that Tor has a means for "Bridges." A Bridge being an IP Address
> that allow one to make a first hop to an IP Address that the ISP, or local
> server is not expecting, or blocking.
>
> My problem being that if one was in a place like China, then the
> government is surely trying to gather up all the Bridges which the Tor
> network has.
>
> Just generally, I see one could create a private webpage somewhere, and
> place on it the software to allow one to use it as one's own personal,
> private Bridge. First hop out. Then one could direct the software on the
> Server to - which ever. start a standard Tor, Connect to a VPN.
>
> It does require trusting where the server is one has put one's software
> on.
>
> Obviously, one could borrow the Software from Tor to create a Bridge. I
> did not mention it to Tor, because, as this is risky in several ways, Tor
> website will not publicly agree to help create this project. Although
> some of their programmers might advise on how to minimize risks.
>
> And the implementation inside Qubes Network manager software -dom0 has its
> own special issues.
>
> Any comments? / is this already on the list of suggestions for Qubes?
>
>
>
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/18eda5de-953d-4b3d-95e4-4167b55e23f4%40googlegroups.com.