Interesting. Is there any reason to not use an obfuscated bridge?<br><div class="gmail_quote"><div dir="ltr">On Mon, Aug 20, 2018 at 2:16 PM David Fifield <<a href="mailto:david@bamsoftware.com">david@bamsoftware.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Sun, Aug 19, 2018 at 07:41:26PM -0400, Nathaniel Suchy wrote:<br>
> Is China successfully probing OBFS4 bridges? Or does this apply more to non<br>
> obfs bridges?<br>
<br>
China doesn't dynamically probe obfs4 bridges. (More precisely: they may<br>
try to probe, but the probes don't result in blocks for obfs4.) They<br>
only block obfs4 bridges whose addresses they learn in other ways. The<br>
MSS=1400 trick works, the authors report, even for non-obfuscated<br>
bridges.<br>
_______________________________________________<br>
tor-relays mailing list<br>
<a href="mailto:tor-relays@lists.torproject.org" target="_blank">tor-relays@lists.torproject.org</a><br>
<a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays" rel="noreferrer" target="_blank">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</a><br>
</blockquote></div>