[tor-bugs] #28496 [Obfuscation/BridgeDB]: Consider dropping yahoo from the bridgedb email domains
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue May 7 13:26:48 UTC 2019
#28496: Consider dropping yahoo from the bridgedb email domains
------------------------------------------+---------------------------
Reporter: arma | Owner: dgoulet
Type: enhancement | Status: assigned
Priority: Medium | Milestone:
Component: Obfuscation/BridgeDB | Version:
Severity: Normal | Resolution:
Keywords: anti-censorship-roadmap-2019 | Actual Points:
Parent ID: | Points: 1
Reviewer: | Sponsor: Sponsor19
------------------------------------------+---------------------------
Comment (by cohosh):
This is related to an issue brought up by pili recently due to
conversation in #tor. A bridge user was complaining that the accepted
email providers required giving up personal information (a phone number)
in order to make an account so they could get bridges.
I wonder if it's possible to assess what kind of sybil detection each of
these providers have? For example, they might also be doing it by IP
address which would be transparent to us but still effective (though maybe
not against an ISP that access to many IPs).
Somewhat relatedly, we could do tests as partially described in our obfs4
testing ticket ##29279 that check how quickly the bridges handed out via
different providers and different methods are being enumerated in a few
target regions. I think this would give us information separate from
#9316. This would be a good thing to do consistently I think, both before
and after we make changes to how we do our distribution.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28496#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list