Yes, I would agree that running an obfuscated bridge would be a good idea, as the network could use some more of those.
I could only find the instructions for running a vanilla (non obfuscated) bridge on the tor website, but did some research, and found a guide to running an obfuscated bridge here https://www.youtube.com/watch?v=vVZ_NEC6Bp4 <https://www.youtube.com/watch?v=vVZ_NEC6Bp4> The OS he is performing this from is Linux, which is what most relays are running off of. I would suggest you try seeing how this works out and then contacting back, Let us know what you think. > On Jun 14, 2018, at 11:46 PM, teor <teor2...@gmail.com> wrote: > > >> On 12 Jun 2018, at 04:29, Gunnar Wolf <gw...@iiec.unam.mx> wrote: >> >> So, it seems my ISP does not want us to run relays ☹ Can you think of >> any way my connection (oversized for my regular uses) can be put to >> use for Tor? I guess it would not work as a bridge either, would it? > > Your relay will work as a bridge if the bridge authority is reachable from > your IP address. > > Otherwise, you could run a private bridge, or a snowflake reflector. > > T > _______________________________________________ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays