Yes, I would agree that running an obfuscated bridge would be a good idea, as 
the network could use some more of those.

I could only find the instructions for running a vanilla (non obfuscated) 
bridge on the tor website, but did some research, and found a guide to running 
an obfuscated bridge here

https://www.youtube.com/watch?v=vVZ_NEC6Bp4 
<https://www.youtube.com/watch?v=vVZ_NEC6Bp4>

The OS he is performing this from is Linux, which is what most relays are 
running off of. I would suggest you try seeing how this works out and then 
contacting back,

Let us know what you think.


> On Jun 14, 2018, at 11:46 PM, teor <teor2...@gmail.com> wrote:
> 
> 
>> On 12 Jun 2018, at 04:29, Gunnar Wolf <gw...@iiec.unam.mx> wrote:
>> 
>> So, it seems my ISP does not want us to run relays ☹ Can you think of
>> any way my connection (oversized for my regular uses) can be put to
>> use for Tor? I guess it would not work as a bridge either, would it?
> 
> Your relay will work as a bridge if the bridge authority is reachable from 
> your IP address.
> 
> Otherwise, you could run a private bridge, or a snowflake reflector.
> 
> T
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to