Hey Jack,
Here's my understanding of your concerns, anyone else please chime in if I'm mistaken anywhere.
For running a normal relay compared to a client connecting to a relay via obfs4, it's less likely to be discovered by examining the content of traffic. The obfs4 protocol is designed to disguise the connection between a client (i.e. torbrowser). Once the traffic hits a relay, the interaction between relays contains less opportunities to identify it as tor traffic as opposed to any other encrypted traffic.
That being said, there are a couple of other things that would make it very easy to identify a TOR relay. First, by default, relays are listed for anyone to examine.
Second, if the authorities are watching, the change in traffic to/from your home computer will be pretty obvious.
Regarding your concerns about children being inappropriately exposed to the dark web, running a relay will make very little difference compared to not running one. For your children to see the content of the dark web they'll need to install torbrowser (or equivalent) and that's going to be the same whether or not you're running a relay. The only potential difference is that if in your area it's very difficult to connect to the tor network and your children know you're running a relay, with some knowledge they could configure torbrowser to connect first to your relay. In some sense, if the authorities are successful in blocking access to the tor network, you could be enabling their romps on the dark web.
HTH
Jivan
On 04/03/2018 02:38 AM, tor-relays-request@lists.torproject.org wrote:
Send tor-relays mailing list submissions to tor-relays@lists.torproject.org
To subscribe or unsubscribe via the World Wide Web, visit https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays or, via email, send a message with subject or body 'help' to tor-relays-request@lists.torproject.org
You can reach the person managing the list at tor-relays-owner@lists.torproject.org
When replying, please edit your Subject line so it is more specific than "Re: Contents of tor-relays digest..."
Today's Topics:
- Re: failed setup of obfs4 on relay (jackoreamnos@tutanota.com)
- Re: failed setup of obfs4 on relay (jackoreamnos@tutanota.com)
- Re: Estimation of bridge traffic / Bridge or relay needed? (jackoreamnos@tutanota.com)
Message: 1 Date: Tue, 3 Apr 2018 05:00:18 +0200 (CEST) From: jackoreamnos@tutanota.com To: tor-relays@lists.torproject.org Cc: tor-relays@lists.torproject.org Subject: Re: [tor-relays] failed setup of obfs4 on relay Message-ID: L98Ret7--3-0@tutanota.com Content-Type: text/plain; charset="utf-8"
Thank you all, that was very helpful. - Jack
- Mar 2018 20:53 by arma@mit.edu mailto:arma@mit.edu:
On Fri, Mar 30, 2018 at 04:52:23PM -0400, Roger Dingledine wrote:
For obfs4, the active prober doesn't know the secret "cert" parameter,
For far far more detail on the various pluggable transports and how they look on the wire, check out this awesome page that David Fifield put together:
https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTr... https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
--Roger
tor-relays mailing list tor-relays@lists.torproject.org mailto:tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays