#30579: Add more STUN servers to the default snowflake configuration in Tor Browser -------------------------------------------------+------------------------- Reporter: cohosh | Owner: (none) Type: defect | Status: new Priority: Medium | Milestone: Component: Circumvention/Snowflake | Version: Severity: Normal | Resolution: Keywords: stun, anti-censorship-roadmap- | Actual Points: october | Parent ID: | Points: 1 Reviewer: | Sponsor: | Sponsor30-can -------------------------------------------------+-------------------------
Comment (by cypherpunks): Hi. There is a better idea. Lot of popular and non-blocked websites put users' visible IP addresses in cookies, custom HTTP Headers or page body. Can we exploit this? I imagine a system crawling websites automatically, finding user's visible IP addresses in their responses, generating the data describing how to carve and parse them and putting it into a repo. Then browsers fetch the repo, select a random webpage from the list, get it and parse the HTTP response. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30579#comment:5> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs