[tor-talk] What is preventing Bridge Enumeration?

BVpTuvb AVMV rxjjx0k at mailfence.com
Wed Feb 15 13:32:32 UTC 2017

What is preventing an attacker to start up a few mid-nodes and enumerating all IPs and substracting those from the list of publicly known entry-nodes to get a list of (all) unlisted bridges?

Seems a lot cheaper than dpi and except for a few false positives due to bots pinging it should be quite accurate is this an inherent and known flaw to the bridge infrastructure that we have to live with or am i missing some keypoint?

More information about the tor-talk mailing list