Yes, I would agree that running an obfuscated bridge would be a good idea, as the network could use some more of those.
I could only find the instructions for running a vanilla (non obfuscated) bridge on the tor website, but did some research, and found a guide to running an obfuscated bridge here
https://www.youtube.com/watch?v=vVZ_NEC6Bp4 https://www.youtube.com/watch?v=vVZ_NEC6Bp4
The OS he is performing this from is Linux, which is what most relays are running off of. I would suggest you try seeing how this works out and then contacting back,
Let us know what you think.
On Jun 14, 2018, at 11:46 PM, teor teor2345@gmail.com wrote:
On 12 Jun 2018, at 04:29, Gunnar Wolf gwolf@iiec.unam.mx wrote:
So, it seems my ISP does not want us to run relays ☹ Can you think of any way my connection (oversized for my regular uses) can be put to use for Tor? I guess it would not work as a bridge either, would it?
Your relay will work as a bridge if the bridge authority is reachable from your IP address.
Otherwise, you could run a private bridge, or a snowflake reflector.
T _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays