[tor-relays] Running random web services on a bridge-server?
kostas at jakeliunas.com
Sat Nov 16 11:09:14 UTC 2013
On Nov 16, 2013 1:01 PM, "Martin Kepplinger" <martink at posteo.de> wrote:
> Sorry for being lazy, I'm not sure if I can figure it enirely out
> myself: Is there _any_ implication on the status of a bridge in the Tor
> network when I run random web services like an open website, xmpp
> server, whatever, on the same device/IP? It'll somehow be more exposed
> that way but I'd be happy on any opinion. I guess probability that
> someone finds out that there is a bridge behind my IP is rising.
I really have nothing to back this up but I would *think* that additional
services on the same IP might mask the bridge from / confuse some
active/reactive probing based bridge disovery attacks. Then again, if
active probing is usually only done on a particular (ip, port) pair (the
one that someone in China is connecting to, for example), then there's
probably no difference anyway.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the tor-relays