[tor-bugs] #8462 [Analysis]: Why don't .ir bridge users fall off when Tor gets censored by DPI?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Mar 13 08:02:57 UTC 2013
#8462: Why don't .ir bridge users fall off when Tor gets censored by DPI?
----------------------+-----------------------------------------------------
Reporter: arma | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Analysis | Version:
Keywords: | Parent:
Points: | Actualpoints:
----------------------+-----------------------------------------------------
Comment(by karsten):
The bridge graphs are still based on the old bridge user counting
algorithm. That means we simply show the sum of all unique connecting IP
addresses over 24 hours. My guess is that we either count IPs even if the
SSL handshake doesn't finish, or that we also count IPs of connections to
the unencrypted Dir port. The new bridge user counting algorithm would
probably show the same pattern as the direct user graphs. Somebody should
implement it.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8462#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list