Alex M (Coyo) <[email protected]> wrote: > On 04/13/2013 01:54 AM, Griffin Boyce wrote: >> >> Here are the common ways: roll a bunch of bridges using Amazon's cloud >> [1], have friends/allies/interesting frenemies run bridges using Vidalia >> [2], or just use a garden-variety VPN/proxy before entering the Tor >> network. >> >> ~Griffin >> >> [1]https://cloud.torproject.**org/ <https://cloud.torproject.org/> >> [2]https://www.torproject.org/**download/download.html.en<https://www.torproject.org/download/download.html.en> >> > > That is extremely unhelpful. > > Merely running bridges on a huge ridiculously insecure public cloud does > not equal running bridge authorities independent of the bridge authority > run by the tor project. > > I have still not gotten a straight answer about whether or not the bridge > community featureset has been released in the stable tor client.
The answer to your second question is no, because private bridges are used in a setting where heavy censorship exists (eg, China), very few people want to expose their private bridge networks to outsiders like yourself. People frequently roll a set of bridges *for their own use*. Of course, if you truly have a problem with the Tor network, you're not obligated to use it. =P Other options still exist for a reason. _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
