Do I understand it right that if I enable the switch on https://snowflake.torproject.org/ page or install the extension in the browser, people will connect using my browser (and hence default WebRTC implementation which won’t be blocked) eventually?
I can ask people to do that.
On 07.12.2021 13:28, meskio wrote:
Quoting ValdikSS via anti-censorship-team (2021-12-06 18:53:55)
There's ongoing Tor block on certain Russian ISPs, which on top of everything else includes Snowflake censorship using DPI.
DTLS connection never establishes and gets filtered in ClientHello/ServerHello sequence.
Check the attached dumps from Tele2 cellular operator (as12958) made on 3 and 6 December 2021.
More information here: https://ntc.party/t/ooni-reports-of-tor-blocking-in-certain-isps-since-2021-...
The related issue: https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowf...
Thanks for the dumps.
Quoting ValdikSS via anti-censorship-team (2021-12-07 11:30:09)
Do I understand it right that if I enable the switch on https://snowflake.torproject.org/ page or install the extension in the browser, people will connect using my browser (and hence default WebRTC implementation which won’t be blocked) eventually?
No, the webextension is used for snowflake clients to connect over webrtc to your browser (and over it being proxied to tor). But the WebRTC implementation of the snowflake client is fingerprinteable and this will not change if is being connected to the webextension or to other snowflake proxy implementations.
Anyway from the client you don't have control on what will be the proxy you will use, installing the webextension people will use your browser as proxy, but you can't choose to use your own browser webextension to connect.
Not sure if I'm answering your question or maybe I didn't understand it correctly.
anti-censorship-team@lists.torproject.org