Help Iranian dissidents by collecting and posting Bridge addresses? (here?)

Ted Smith teddks at gmail.com
Thu Jun 18 02:36:40 UTC 2009


On Wed, 2009-06-17 at 22:11 -0400, Roger Dingledine wrote:
> On Wed, Jun 17, 2009 at 06:26:43PM -0700, Chris Humphry wrote:
> > Please help...without proxies (ie. Bridges) the Iranian dissidents have no
> > voice!
> 
> Yeah, see, I'm not sure whether this is true. If ordinary bridges are
> working, then probably ordinary Tor relays are working too. Or said
> another way, if ordinary Tor relays aren't working, probably ordinary
> bridges won't work either.
> 
> We've heard rumors they're blocking all encrypted traffic. Does this
> mean everything that does an SSL handshake no matter the port? Or does
> it mean the blocked port 443?
> 
> If the former, an automated system like Tor is going to have a tough time
> keeping up -- at least without the tweaks we've been pondering over the
> past few days. ;)
> 
> If the latter, then setting up a bunch of bridges on port 80 (even
> though everything's still encrypted) might be the ticket.
> 
> Lots of misinformation going around, and not so much information.

If things get really bad, people can just resort to setting up DNS or
even ICMP tunnels. 

Internet censorship is probably the largest-scale game of whack-a-mole
ever played.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 835 bytes
Desc: This is a digitally signed message part
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20090617/d9daeaa6/attachment.pgp>


More information about the tor-talk mailing list