Hello,
today I heared he was released because his devices did not contain حَرَام / haram contents.
Thanks very much but I have to leave this mailing list now, I might re-join under a different e-mail provider I don't want to get detected and use tor only as little as possible to get uncensored news.
Bye bye brothers, peace for all.
Gesendet: Dienstag, 25. Januar 2022 um 14:51 Uhr Von: "gus" gus@torproject.org An: tor-relays@lists.torproject.org Betreff: Re: [tor-relays] We need bridges with iat-mode set to 1 and especially 2 as well! Hi,
I live in Iran. Can't disclose my ISP because one person using Tor was sent to jail recently even though he did nothing wrong.
This look very serious. Can you share more information? There are many HRD organizations from Iran that we can contact to follow up this case.
From where you get the advice that using bridges 'iat-mode=2' will
protect you? Can you link here?
Gus
On Mon, Jan 24, 2022 at 11:30:47PM +0100, juckiuscaesar@web.de wrote:
Hey, I live in Iran. Can't disclose my ISP because one person using Tor was sent to jail recently even though he did nothing wrong.
For all Bridge Admins:
You can turn change iat-mode with this config entry in your torrc:
ServerTransportOptions obfs4 iat-mode=2
Good Luck.
Gesendet: Donnerstag, 20. Januar 2022 um 14:32 Uhr Von: "gus" gus@torproject.org An: tor-relays@lists.torproject.org Betreff: Re: [tor-relays] We need bridges with iat-mode set to 1 and especially 2 as well! Hi Anonymous,
I'm curious about in which country iat_mode is useful. Could you tell us?
You may have missed this discussion on the tor-relays mailing list: https://lists.torproject.org/pipermail/tor-relays/2021-February/019370.html
best, Gus
On Thu, Jan 20, 2022 at 01:52:28PM +0100, juckiuscaesar@web.de wrote:
<html><head></head><body><div style="font-family: Verdana;font-size: 12.0px;"><div> <div>Hi,</div>
<div> </div>
<div>Setting up more and more obfs4 bridges is fine, but it literally took me 1 hour to get a bridge supporting iat-mode=2 through https://bridges.torproject.org[https://bridges.torproject.org][https://bridges.torproject.org[https://bridges.torproject.org]] (that is knowing how to circumvent the fingerprinting measures on that site, which are intended to make it harder for adversaries to get bridge IP's), this is unacceptable as this is the only way I can connect to Tor in my country.</div>
<div> </div>
<div>obfs4 has the possibility to obfuscate the packet size and timing of the underlying protocol it obfuscates, so why is almost no bridge using it?</div>
<div> </div>
<div>A call for action is needed, additionally, please also add information about this to the "How to set up a Relay / Bridge" pages.</div>
<div> </div>
<div>Please do something.</div>
<div> </div>
<div>Regards,</div>
<div>Anonymous</div> </div></div></body></html>
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays%5Bhttps://l...]]
-- The Tor Project Community Team Lead _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays%5Bhttps://l...]] _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays%5Bhttps://l...]
-- The Tor Project Community Team Lead _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays%5Bhttps://l...]