Yes, I would agree that running an obfuscated bridge would be a good idea, as the network could use some more of those.

I could only find the instructions for running a vanilla (non obfuscated) bridge on the tor website, but did some research, and found a guide to running an obfuscated bridge here

https://www.youtube.com/watch?v=vVZ_NEC6Bp4

The OS he is performing this from is Linux, which is what most relays are running off of. I would suggest you try seeing how this works out and then contacting back,

Let us know what you think.


On Jun 14, 2018, at 11:46 PM, teor <teor2345@gmail.com> wrote:


On 12 Jun 2018, at 04:29, Gunnar Wolf <gwolf@iiec.unam.mx> wrote:

So, it seems my ISP does not want us to run relays ☹ Can you think of
any way my connection (oversized for my regular uses) can be put to
use for Tor? I guess it would not work as a bridge either, would it?

Your relay will work as a bridge if the bridge authority is reachable from your IP address.

Otherwise, you could run a private bridge, or a snowflake reflector.

T
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays