On Monday, 18 July 2022 13:47:21 -03 meskio wrote:
What do you think of the proposal? How can we improve it?
A slightly unrelated question:
Was there any consideration about deanonymization attacks by giving the user a bridge controlled by the attacker? I worry that those get more likely when getting bridges via links and QR codes becomes normalized.
Apart from the source IP address of the user and their Tor traffic pattern, is there anything else an attacker can learn from operating the bridge?
Kind Regards, Torsten