Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread Andreas Krey
On Wed, 03 Oct 2018 13:03:14 +, ithor wrote: ... > Can you elaborate upon that for the noob I am. If i understand you correctly, > when using domain fronting, Tor basically spoofs or "hijacks" the ip address > of an existing Azure server client ? SNI: Server Name Indication. While setting

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread ithor
The IP address of the Azure server you're connecting to. > How does the selection of the Azure server works ? Randomly ? If i understood > well, domain-fronting servers are supposedly located geographically close to > the origin of the browser request. Could it be that TBB selects an Azure >

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread Jonathan Marquardt
On Wed, Oct 03, 2018 at 12:25:52PM +, ithor wrote: > So a meek request is sent in clear-text. What exact information is given ? > The exact ip address of the Azure server, its geolocation ? The IP address of the Azure server you're connecting to. In the case of meek-azure the firewall would

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread Jonathan Marquardt
On Wed, Oct 03, 2018 at 08:30:53AM -0400, James Bunnell wrote: > I'm a little curious why some people don't take G Suite into consideration :) Google clearly doesn't like seeing it's services used for censorship circumvention.

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread ithor
Or they don't want to ruin their standing with the client who has the name that is used in the SNI (and who takes the loss when china should decide to block that b/c it's used by fronters). Can you elaborate upon that for the noob I am. If i understand you correctly, when using domain fronting,

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread Andreas Krey
On Wed, 03 Oct 2018 14:06:27 +, Jonathan Marquardt wrote: ... > They did so supposedly because it voilated their terms of use. It also probably violates a few RFCs, and they never advertised this 'feature'. > They probably don't want to ruin their relationships with totalitarian > regimes.

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread James Bunnell
I'm a little curious why some people don't take G Suite into consideration :) On Wed, Oct 3, 2018 at 8:26 AM ithor wrote: > > ok, so for once i'll keep my fingers crossed for Microsoft... > > How should I imagine the connection until the Azure server. What does it tell > the DPI ? Just that I'm

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread ithor
ok, so for once i'll keep my fingers crossed for Microsoft... How should I imagine the connection until the Azure server. What does it tell the DPI ? Just that I'm connecting to a close-to-my-country-based Microsoft CDN ? On wikipage it's stated that The technique works by using different

Re: [tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread Jonathan Marquardt
On Wed, Oct 03, 2018 at 08:38:52AM +, ithor wrote: > ever since TBB 8, there's the new moat way to obtain private obfs4 bridges > through a CAPTCHA. In the following webpage it's stated meek is used in > order to communicate with the Tor bridges database. Now, my question is : > which ones

Re: [tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?

2018-10-03 Thread ithor
Ok, so basically I have to stick with trust... kinda dangerous really in my geographical location. I know there's a lot of talk about the pro and contra of using some kind of VPN before entering the Tor network, how it can deanonymize you and how you basically still have to trust someone. But

Re: [tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?

2018-10-03 Thread Andreas Krey
On Wed, 03 Oct 2018 08:41:29 +, ithor wrote: ... > So would there be a way to (pen-?)test a private obfs4 bridge as being non > blacklisted and actually usable without really trying to connect to it and > alarming my ISP and DPI the like ? Obviously not. To test that you need to try to

Re: [tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?

2018-10-03 Thread marvel
I think that tor is not designed to enable you to hide the fact you are using tor from an adversary. And that technologies like bridges are there to enable you to get out, not to hide the fact that you are getting out or may have in the past or may in the future. That is to say; methods for

[tor-talk] ascertain trustworthyness of entry-nodes and obfs4 bridges?

2018-10-03 Thread ithor
Hi, when living under an oppressive regime with draconian Internet censorship, it is crucial for me to be able to connect to the Tor network without arousing any suspicion and to be sure I'm not connecting to a malicious entry-node or obfs4 bridge. The only way for me to bypass DPI is to use

[tor-talk] privacy concerns with new CAPTCHA-method for obfs4 bridges

2018-10-03 Thread ithor
Hi, ever since TBB 8, there's the new moat way to obtain private obfs4 bridges through a CAPTCHA. In the following webpage it's stated meek is used in order to communicate with the Tor bridges database. Now, my question is : which ones ? In my country, domain fronting for Amazon and Google are