[tor-bugs] #33815 [Applications]: vanguards with meek - do or don't?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sun Apr 5 01:02:05 UTC 2020
#33815: vanguards with meek - do or don't?
-------------------------+------------------------------
Reporter: cypherpunks | Owner: (none)
Type: defect | Status: new
Priority: Medium | Component: Applications
Version: | Severity: Normal
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------+------------------------------
I already using vanguards and I'd like to use bridge as additional
protection.
https://github.com/mikeperry-tor/vanguards/blob/master/README_SECURITY.md
#the-best-way-to-run-tor-relays-or-bridges-with-your-service
Q1. Why did you said "best bridge protocol to use is obfs4"? Why not meek-
azure(included in tor browser)? (and how to do it on Linux?)
Q2. Is there any reason why I (service operator) should NOT use meek with
vanguards?
Q3. There are many unknown obfs4 bridges on bridges.torproject.org.
Instead of trusting these faceless obfs4 dudes(no offense) why not use
meek(blend into CDN crowd)?
Q4. You said "can provide some additional protection against traffic". I'm
currently using one Tor daemon to 'host onion service' & 'use as socks
proxy for my browsing/bitmessage'. Why not add "Use your Tor as a client"
guide to README_SECURITY.md? And if it does not help preventing traffic
attack, write about it. (or should I launch another tor daemon just for
client use/split tor-service and tor-client?)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33815>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list