I know it might be a fundamental change to the Tor network, but would it be possible to obfuscate the Tor bridge/relay addresses with their respective fingerprints; similar, to the I2P network? I've often thought that this aspect of the I2P network is one that is implemented well. Perhaps Directory Authorities could preform fingerprint to address resolution? I think it would be extremely beneficial if neither bridge or relay addresses were published in the wild. It would make great strides in further buffering the Tor network from various black-listing/censorship techniques. Respectfully,
Gary— This Message Originated by the Sun. iBigBlue 63W Solar Array (~12 Hour Charge) + 2 x Charmast 26800mAh Power Banks = iPhone XS Max 512GB (~2 Weeks Charged)
On Thursday, December 16, 2021, 4:43:29 AM MST, meskio meskio@torproject.org wrote:
Quoting Space Oddity via tor-relays (2021-12-16 11:35:10)
I was thinking, what could be the ways Russian authorities could get bridges to block. One of the obvious ways to do this is to grab bridges from Moat/HTTPS, but since that would require solving a captcha, this would indicate its strength is insufficient, or they are able to crowdsource/mass solve somehow.
Captchas are a hard valance between usability an hard to break. I'm happy to hear ideas on how to do captchas better without sharing data of the users to third parties or making it way harder for people that solve them.
There are many services that you pay to solve captchas they could be using, captchas doesn't seem to be a great protection and we are working on finding other options.
The other thought is an attack via email. Can we do something with it, what do you think?
What do you mean about attack via email?