On 2013-10-07 16:13, GDR! wrote: > On 07.10.2013 21:11, dardok wrote: >> I guess that you misunderstood the concept of obfsproxy. It is useful >> to obfuscate the communication between a client within a censorship >> zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol >> communication, instead it is designed to look random (and the packets >> are encypted). So if you try to run this service over the HTTP port 80 >> and the packets are random and not looking like a HTTP communication, >> it will be more suspicious than running this service over any other port. > > Thank you. I understood the concept but not the implementation. > > "For example, there MIGHT be a HTTP transport which transforms Tor > traffic to look like regular HTTP traffic." > > I missed the "MIGHT" part. Too bad this doesn't exist.
It does: StegoTorus. Greets, Jeroen _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
