Silk Road forums

Discussion => Security => Topic started by: zasx123 on June 03, 2013, 06:26 pm

Title: Using bridges???
Post by: zasx123 on June 03, 2013, 06:26 pm
Hello,

I see a lot of different opinions on using bridges. Some say it is more secure because your ISP can not see you are using TOR. Others say you have one less entry-node.
I am using tails so i can use obfsproxies, if that matter.

What do you think is the best for me to use?
Title: Re: Using bridges???
Post by: randomOVDB#2 on June 03, 2013, 06:34 pm
If you need to hide Tor usage from your ISP use obfsproxy.
If you don't need to hide Tor usage from your ISP don't use obfsproxy.

ISPs however don't really run DPI on the reg so hiding is possibly an overkill if not in [insert location].

From TorProject blog.
Quote
Tor uses 3 hop circuits, it doesn't use "3 nodes in addition to the initial node".

The obfsproxy bundle does the exact same thing, but it also obfuscates your connection to the initial node. The obfsproxy bundle *does not change anything else*, apart from adding that obfuscation.

Generaly TBB is more stable than the obfsproxy version.
Title: Re: Using bridges???
Post by: saidanddone on June 03, 2013, 10:05 pm
I just started using bridges with TAILS. I had read that ISP detection of tor usage might be more probable in less densely populated areas, and that using bridges (especially obfuscated ones) would result in far less likely identification of tor usage by my ISP.  Adding the bridge relay has made me feel more protected.

See this thread for some good info on bridges:
http://dkn255hz262ypmii.onion/index.php?topic=114141.0
Good luck!