Yes, it does. I guess it's actually detecting bridges from users. The bridges become 'one-off', you can only use those bridges one time
at least in a period of time) and the second time you try to connect through the same bridges, it won't work.
From: kostas@jakeliunas.com
Date: Tue, 20 Aug 2013 13:01:35 +0300
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Experience with obfuscated bridge on Raspberry Pi Raspian
Thanks for sharing your experience!
> After the week I decided to shut the bridge down because I heard from people being contacted by the police even though only running a non-exit relay.
Do you remember where you did hear this? Was it in writing, are you by chance maybe able to link to it? It would be interesting to know more.
All non-bridge relays (exit or non-exit) can be enumerated by anyone (that's by design); this is not the case with bridges. However I suppose the extent to which any potential efforts to do just that may be happening does very much depend on the jurisdiction where that bridge is being run; China's internet censorship / 'firewall' thing seems to have been trying to enumerate bridges for a while now. [1] In any case, as far as I'm concerned, it would be *really* interesting to hear of any incidents between the police and non-exit relay operators.
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays