On Tue, Jan 12, 2021 at 10:03:52PM +0100, lists@for-privacy.net wrote:
On 11.01.2021 21:59, Toralf Förster wrote:
On 1/11/21 9:03 PM, Philipp Winter wrote:
FINGERPRINT is your bridge's fingerprint or its hashed fingerprint -- either works.
for public bridges ;-)
Bridges (PublishServerDescriptor 1 + BridgeDistribution none) work.
Yes, that's because the backend needs a bridge's descriptor but doesn't care about its distribution method.
Completely private bridges (PublishServerDescriptor 0 + BridgeDistribution none) can look here: https://bridges.torproject.org/scan/
Note that this service only tests the target's TCP port. The port may be reachable but the bridge may still be dysfunctional. The /status page actually fetches the target's descriptor, which gives you more assurance that the bridge actually works.