[tor-bugs] #33815 [Applications]: vanguards with meek - do or don't?

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Apr 5 01:02:05 UTC 2020


#33815: vanguards with meek - do or don't?
-------------------------+------------------------------
 Reporter:  cypherpunks  |          Owner:  (none)
     Type:  defect       |         Status:  new
 Priority:  Medium       |      Component:  Applications
  Version:               |       Severity:  Normal
 Keywords:               |  Actual Points:
Parent ID:               |         Points:
 Reviewer:               |        Sponsor:
-------------------------+------------------------------
 I already using vanguards and I'd like to use bridge as additional
 protection.


 https://github.com/mikeperry-tor/vanguards/blob/master/README_SECURITY.md
 #the-best-way-to-run-tor-relays-or-bridges-with-your-service


 Q1. Why did you said "best bridge protocol to use is obfs4"? Why not meek-
 azure(included in tor browser)? (and how to do it on Linux?)


 Q2. Is there any reason why I (service operator) should NOT use meek with
 vanguards?


 Q3. There are many unknown obfs4 bridges on bridges.torproject.org.
 Instead of trusting these faceless obfs4 dudes(no offense) why not use
 meek(blend into CDN crowd)?


 Q4. You said "can provide some additional protection against traffic". I'm
 currently using one Tor daemon to 'host onion service' & 'use as socks
 proxy for my browsing/bitmessage'. Why not add "Use your Tor as a client"
 guide to README_SECURITY.md? And if it does not help preventing traffic
 attack, write about it. (or should I launch another tor daemon just for
 client use/split tor-service and tor-client?)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33815>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list