shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

242
active users

#webtunnel

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> Q: I wish there was a similar tool test <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a>, as <a href="https://bridges.torproject.org/scan/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bridges.torproject.org/scan/</span><span class="invisible"></span></a> is not that good and I don't want to hammer it with dozens of addresses, cuz at best that's quite antisocial if not possibly trigger responses assuming this is an intelligence gathering operation.</p><ul><li>Ideally sone standalone binary that one can just give a list of <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a>|s in a text file (similar to the way one can just past them in at <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a>) would help.</li></ul><p>I.e. </p><pre><code>bridgetest -v4 obfs4 203.0.113.0:80 …<br><br>bridgetest -v6 webtunnel [2001:DB8::1]:443 …<br><br>bridgetest -list ./tor.bridges.list.private.tsv <br></code></pre><ul><li>But maybe <a href="https://infosec.space/tags/onionprobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onionprobe</span></a> already does that. In that case please tell me to <em>"<a href="https://infosec.space/tags/RTFM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RTFM</span></a>!"</em>…</li></ul><p>Similarly there needs to be a more granular way to request <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> from <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> (as it's basically impossible to get <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> <a href="https://infosec.space/tags/Webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webtunnel</span></a> addresses nor is there an option to filter for <a href="https://infosec.space/tags/ports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ports</span></a> like <code>:80</code> &amp; <code>:443</code> to deal with restrictive <a href="https://infosec.space/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> (i.e. on public <a href="https://infosec.space/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a>)…</p><ul><li>there are flags like <code>ipv6=yes</code> but neither <code>ipv4=yes</code> nor <code>ipv6=no</code> yielded me other resultd than <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <code>webtunnel</code> bridges…</li></ul><p>And before anyone asks: Yes, I do have a <em>"legitimate purpose"</em> as some of my contacts do need Bridges to get beyond a mandatory firewall and/or do use <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> (through an <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> tunnel) to circumvent Tor &amp; <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> blocks and maintain privacy (as many companies do block sometimes entire <a href="https://infosec.space/tags/Hosters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosters</span></a>' ASNs due to rampant <a href="https://infosec.space/tags/scrapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scrapers</span></a>…</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> plus support for <code>meek</code>, <code>snowflake</code>, <code>webtunnel</code> and non-<a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> seems missing in <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a>.</p><ul><li>It would also help if <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> allowed to actually select <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> <a href="https://bridges.torproject.org/options" rel="nofollow noopener noreferrer" target="_blank">and not just</a> <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> and select ports (i.e. 80 &amp; 443) on top of that.</li></ul><p>Cuz to this day I've to yet see an IPv4-<a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> <a href="https://infosec.space/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a>…</p><p><a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> <a href="https://infosec.space/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://infosec.space/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.space/tags/InternetCensorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetCensorship</span></a></p>
nemo™ 🇺🇦<p>The Tor Project celebrates a major victory against online censorship, deploying its 300th WebTunnel bridge! 🎉 This milestone expands internet access in censored regions by disguising Tor traffic as regular web activity. Learn how this helps bypass restrictions: [<a href="https://cyberinsider.com/tor-celebrates-300th-webtunnel-bridge-milestone-in-fight-against-censorship/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/tor-celebrate</span><span class="invisible">s-300th-webtunnel-bridge-milestone-in-fight-against-censorship/</span></a>] <a href="https://mas.to/tags/TorProject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorProject</span></a> <a href="https://mas.to/tags/WebTunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnel</span></a> <a href="https://mas.to/tags/Censorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Censorship</span></a> <a href="https://mas.to/tags/InternetFreedom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetFreedom</span></a> 🛡️🌐 <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a></p>
Kevin Karhan :verified:<p>Right now the problem with <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> is that I can't get <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> bridges on <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> even when I try to specify those by setting <code>ipv6=no</code> at the URL:</p><p><a href="https://bridges.torproject.org/bridges?transport=webtunnel&amp;ipv6=no" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bridges.torproject.org/bridges</span><span class="invisible">?transport=webtunnel&amp;ipv6=no</span></a></p><p>And no, removing IPv6 from the URL doesn't yield any IPv4 results either.<br><a href="https://bridges.torproject.org/bridges?transport=webtunnel" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bridges.torproject.org/bridges</span><span class="invisible">?transport=webtunnel</span></a></p><p>It would be better if <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> would have a radio button / switch to choose IPv4 &amp; <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> for this reason.</p>
Kevin Karhan :verified:<p><a href="https://infosec.space/tags/WhatsMissing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsMissing</span></a>: A tool to check if <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> are still available/online/reachable that one can use either <a href="https://infosec.space/tags/standalone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standalone</span></a> (with <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and/or <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> Expert Bundle) or on <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a>. </p><ul><li>Cuz I do run into issues and kinda want to sort <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> by availability so I don't waste time on a <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a> that is down and also thin-out the list of bridges that ain't online anymore.</li></ul><p>Whilst I do acknowledge that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> do disrecommend having a huge list of Tor Bridges on hand, I do regularly need them for contacts who are behind a <a href="https://infosec.space/tags/GreatFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreatFirewall</span></a> and can't <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel out of it.</p><ul><li>Sadly <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> <a href="https://bridges.torproject.org" rel="nofollow noopener noreferrer" target="_blank">doesn't offer</a> good <a href="https://infosec.space/tags/filtering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>filtering</span></a> options so one can't just query types effectively like <em>"I need <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> on <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a>"</em> or <em>"I can only use Ports 80 &amp; 443 on <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>"</em> which may work.</li></ul><p>Espechally being able to filter for <a href="https://infosec.space/tags/IPv4only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4only</span></a> and not just <a href="https://infosec.space/tags/IPv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6only</span></a> is something I miss, alongside the filter for <a href="https://infosec.space/tags/PluggableTransports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PluggableTransports</span></a> type as <span class="h-card" translate="no"><a href="https://social.librem.one/@guardianproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>guardianproject</span></a></span> <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Orbot</span></a> seems to only handle <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> and not webtunnel or <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> at all...</p><ul><li>I'm pretty certain that merely pinging a bridge at it's port isn't working as a shure-fire way to check for it's availability.</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@wmd" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wmd</span></a></span> <span class="h-card" translate="no"><a href="https://denden.world/@miqokin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>miqokin</span></a></span> I've yet to find a nation that <a href="https://chaos.social/@wmd/113899189531053167" rel="nofollow noopener noreferrer" target="_blank">criminalizes</a> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> but not <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>|s that facilitate the same...</p><ul><li>Also commercial VPN providers are relatively easy to detect, filter &amp; block unless they support <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunneling.</li></ul><p>Whereas <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> has multiple ways to circumvent <a href="https://infosec.space/tags/InternetCensorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetCensorship</span></a>, includibg multiple <a href="https://infosec.space/tags/proxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxy</span></a> &amp; 9bfuscation systems like <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a>, <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> and regular <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> on included, public query-able amd private lists...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://void.lgbt/users/ActuallyAubrey" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ActuallyAubrey</span></a></span> That depends on the juristiction in question, the plan &amp; provider in question as well as used hardware in question.</p><ul><li>In case of even remotely suspected <a href="https://infosec.space/tags/Stalkerware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stalkerware</span></a> I do recommend to get personally-owned, controlled, secured and hidden hardware to enable unsurveiled comms.</li></ul><p>Consider telephony &amp; SMS inherently &amp; unfixably insecure.</p><ul><li>If in doubt get a new Android with an anonymous prepaid SIM that has affordable data options and use <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Orbot</span></a> with <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> on ports 80 &amp; 443 which use <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> &amp; <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> transports, so any surveiling party will only see non-suspicious HTTPS traffic.</li></ul><p>OFC a maliciously configured CPE/Router can log &amp; report <em>all</em> pachets that travel through, but <a href="https://infosec.space/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> &amp; <a href="https://infosec.space/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> or any unencrypted comms are susceptible.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://rubber.social/@dragonarchitect" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dragonarchitect</span></a></span> <span class="h-card" translate="no"><a href="https://mstdn.social/@DeltaWye" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DeltaWye</span></a></span> this also is the advantage of <a href="https://infosec.space/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a>: Only the <a href="https://infosec.space/tags/endpoints" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpoints</span></a> need to be able to reach each other: All the complicated <a href="https://infosec.space/tags/Routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routing</span></a> is transparent and thus changing routes don't result in lost connections.</p><ul><li>You can see this with <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> traffic using <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> <a href="https://infosec.space/tags/bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridges</span></a>: It smoothly shifts between <a href="https://infosec.space/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> &amp; <a href="https://infosec.space/tags/WWAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WWAN</span></a> and back...</li></ul>
Scripter :verified_flashing:<p>Tor: Anonymisierungsdienst bringt Webtunnel gegen Zensur | heise online<br><a href="https://heise.de/-9655111" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-9655111</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://social.tchncs.de/tags/Webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webtunnel</span></a> <a href="https://social.tchncs.de/tags/Zensur" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zensur</span></a></p>
Avoid the Hack! :donor:<p>Tor’s new WebTunnel bridges mimic <a href="https://infosec.exchange/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> traffic to evade censorship</p><p><a href="https://infosec.exchange/tags/WebTunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnel</span></a> is a new bridge type designed to help bypass censorship by helping <a href="https://infosec.exchange/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> traffic (which can stand out like a sore thumb,e ven if they have no idea what you are actually doing) blend in with regular HTTPS traffic.</p><p><a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/privacymatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacymatters</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/tors-new-webtunnel-bridges-mimic-https-traffic-to-evade-censorship/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/tors-new-webtunnel-bridges-mimic-https-traffic-to-evade-censorship/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> And yes, I do need some with the ability to filter as contacts in <a href="https://mstdn.social/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> that want to <a href="https://mstdn.social/tags/flee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flee</span></a> basically have no other option than <a href="https://mstdn.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> as <a href="https://mstdn.social/tags/Roskomnadnozr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Roskomnadnozr</span></a> systematically bricks <a href="https://mstdn.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>'s and <a href="https://mstdn.social/tags/Proxies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxies</span></a> and only allows like <a href="https://mstdn.social/tags/Webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webtunnel</span></a> and <a href="https://mstdn.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> connections [the latter one propably for Russia's <a href="https://mstdn.social/tags/CyberWarfare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberWarfare</span></a>] to pass through.</p><p>So even if they had like <a href="https://mstdn.social/tags/GMail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GMail</span></a> or <a href="https://mstdn.social/tags/RiseUp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiseUp</span></a> that wouldn't fix their issues nor would it solve that need.</p>
Kevin Karhan :verified:<p>So please <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> allow people - if you don't want to change the UI for <a href="https://bridges.torproject.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bridges.torproject.org</span><span class="invisible"></span></a> - to at least craft requests that allow users to select <a href="https://mstdn.social/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> and/or <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://mstdn.social/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> as well as <a href="https://mstdn.social/tags/Transports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Transports</span></a> [regardless inf <a href="https://mstdn.social/tags/vanilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vanilla</span></a>, <a href="https://mstdn.social/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://mstdn.social/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a>, <a href="https://mstdn.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> or <a href="https://mstdn.social/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a>] and <a href="https://mstdn.social/tags/ports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ports</span></a> [i.e. 443 &amp; 80] are often the only known working ones!</p>
Kevin Karhan :verified:<p>There are several issues I have with <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> 's <a href="https://mstdn.social/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a>: </p><p>For once, it's good and convenient but it's filtering options are half broken.</p><p>For example <a href="https://bridges.torproject.org/bridges/?transport=webtunnel&amp;ipv6=yes" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bridges.torproject.org/bridges</span><span class="invisible">/?transport=webtunnel&amp;ipv6=yes</span></a> will get me a <a href="https://mstdn.social/tags/Webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webtunnel</span></a> <a href="https://mstdn.social/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a> that has <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>, but setting ipv6=no or ipv4=yes doesn't work.</p><p>Nor can I add ports=80,443 or port=443&amp;port=80 or similar.</p><p>So it would be really cool if one could just query stuff like that [OFC I'm not talking about the CAPTCA, that exist for reasons]...</p>