On Mon, Sep 30, 2013 at 01:03:14AM -0700, Rohit wrote:
This should satisfy most goals.
- A passive attacker wouldn't be able to distinguish between HTTPS->HTTPS traffic and Tor->Bridge. (Both use TLS)
This seems false to me; it's not too hard to distinguish Tor-over-TLS from HTTP-over-TLS, right?
- Ian