commit 275f35a3522340bfe2908a44ad185f3badac7afc Author: emma peel emma.peel@riseup.net Date: Tue May 18 19:04:35 2021 +0200
better explanation, no slang as it is an introductory text --- content/relay/types-of-relays/contents.lr | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/content/relay/types-of-relays/contents.lr b/content/relay/types-of-relays/contents.lr index e2daa10..a92de72 100644 --- a/content/relay/types-of-relays/contents.lr +++ b/content/relay/types-of-relays/contents.lr @@ -63,6 +63,6 @@ Several countries, including China and Iran, have found ways to detect and block [Pluggable transports](https://tb-manual.torproject.org/circumvention/), a special kind of bridge, address this by adding an additional layer of obfuscation.
Bridges are relatively easy, low-risk and low bandwidth Tor nodes to operate, but they have a big impact on users. -A bridge isn't likely to receive any abuse complaints, and since bridges are not listed in the public consensus, they are unlikely to be blocked by popular services. +A bridge isn't likely to receive any abuse complaints, and since bridges are not listed as public relays, they are unlikely to be blocked by popular services.
Bridges are a great option if you can only run a Tor node from your home network, have only one static IP, and don't have a huge amount of bandwidth to donate -- we recommend giving your bridge at least 1 Mbit/sec.
tor-commits@lists.torproject.org