med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

365
active users

#webtunnel

0 posts0 participants0 posts today
Replied in thread

@torproject Q: I wish there was a similar tool test #Bridges, as bridges.torproject.org/scan/ is not that good and I don't want to hammer it with dozens of addresses, cuz at best that's quite antisocial if not possibly trigger responses assuming this is an intelligence gathering operation.

  • Ideally sone standalone binary that one can just give a list of #TorBridge|s in a text file (similar to the way one can just past them in at #TorBrowser) would help.

I.e.

bridgetest -v4 obfs4 203.0.113.0:80 …

bridgetest -v6 webtunnel [2001:DB8::1]:443 …

bridgetest -list ./tor.bridges.list.private.tsv
  • But maybe #onionprobe already does that. In that case please tell me to "#RTFM!"

Similarly there needs to be a more granular way to request #TorBridges from #BridgeDB (as it's basically impossible to get #IPv4 #Webtunnel addresses nor is there an option to filter for #ports like :80 & :443 to deal with restrictive #firewalls (i.e. on public #WiFi)…

  • there are flags like ipv6=yes but neither ipv4=yes nor ipv6=no yielded me other resultd than #IPv6 webtunnel bridges…

And before anyone asks: Yes, I do have a "legitimate purpose" as some of my contacts do need Bridges to get beyond a mandatory firewall and/or do use #TorBrowser (through an #SSH tunnel) to circumvent Tor & #VPN blocks and maintain privacy (as many companies do block sometimes entire #Hosters' ASNs due to rampant #scrapers

bridges.torproject.orgThe Tor Project | Privacy & Freedom OnlineDefend yourself against tracking and surveillance. Circumvent censorship.
Continued thread

@tails_live @tails @torproject plus support for meek, snowflake, webtunnel and non-#obfs4 #Bridges seems missing in #Tails.

Cuz to this day I've to yet see an IPv4-#webtunnel #bridge

bridges.torproject.orgThe Tor Project | Privacy & Freedom OnlineDefend yourself against tracking and surveillance. Circumvent censorship.
#meek#snowflake#Tor
Continued thread

Right now the problem with @torproject #BridgeDB is that I can't get #webtunnel bridges on #IPv4 even when I try to specify those by setting ipv6=no at the URL:

bridges.torproject.org/bridges

And no, removing IPv6 from the URL doesn't yield any IPv4 results either.
bridges.torproject.org/bridges

It would be better if #BridgeDB would have a radio button / switch to choose IPv4 & #IPv6 for this reason.

#WhatsMissing: A tool to check if #TorBridges are still available/online/reachable that one can use either #standalone (with #TorBrowser and/or #Tor Expert Bundle) or on @tails_live / @tails / #Tails.

  • Cuz I do run into issues and kinda want to sort #Bridges by availability so I don't waste time on a #TorBridge that is down and also thin-out the list of bridges that ain't online anymore.

Whilst I do acknowledge that @torproject do disrecommend having a huge list of Tor Bridges on hand, I do regularly need them for contacts who are behind a #GreatFirewall and can't #SSH-Tunnel out of it.

Espechally being able to filter for #IPv4only and not just #IPv6only is something I miss, alongside the filter for #PluggableTransports type as @guardianproject #Orbot seems to only handle #obfs4 and not webtunnel or #meek at all...

  • I'm pretty certain that merely pinging a bridge at it's port isn't working as a shure-fire way to check for it's availability.
bridges.torproject.orgThe Tor Project | Privacy & Freedom OnlineDefend yourself against tracking and surveillance. Circumvent censorship.
Continued thread

Just a friendly reminder that @torproject needs more volunteers to run #WebTunnel bridges.

If you're a #fediverse admin, you can safely run a WebTunnel bridge behind your Nginx web server in order to help people access the open internet.

community.torproject.org/relay

community.torproject.orgTor Project | WebTunnel BridgeDefend yourself against tracking and surveillance. Circumvent censorship. | WebTunnel Bridge

Recently we upgraded our #Tor #obfs4 bridge relay from Ubuntu 22.04 to 24.04. Unfortunately we missed a permissions issue with obfs4 that changed with the upgrade. This kept Tor in a restart loop and prevented anyone from using the bridges. This has been corrected.

This were the errors:

[warn] Server managed proxy encountered a method error. (obfs4 listen tcp 23.129.64.90:443: bind: permission denied)

[warn] Managed proxy '/usr/bin/obfs4proxy' was spawned successfully, but it didn't launch any pluggable transport listeners!

We also have a #WebTunnel bridge that was not affected since it's on the disobey.net server.

emeraldonion.org/bridges/

emeraldonion.orgBridgesEmerald Onion hosted Tor bridges

Tor in Russia: A call for more #WebTunnel bridges

Recent reports from Tor users in #Russia indicate an escalation in #online censorship with the goal of blocking access to #Tor and other circumvention #tool's. This new wave includes attempts to #block Tor bridges and pluggable transports developed by the @torproject, removal of circumvention #app's from stores, and targeting popular hosting providers, shrinking the space for bypassing #censorship. […]

🧅 blog.torproject.org/call-for-w

blog.torproject.orgTor in Russia: A call for more WebTunnel bridges | Tor ProjectAs the Russian government intensifies its grip on the internet, censorship circumvention tools like Tor are more critical than ever. Here's the latest on Tor censorship in Russia and how you can help by running WebTunnel bridges.
Replied in thread

@ActuallyAubrey That depends on the juristiction in question, the plan & provider in question as well as used hardware in question.

  • In case of even remotely suspected #Stalkerware I do recommend to get personally-owned, controlled, secured and hidden hardware to enable unsurveiled comms.

Consider telephony & SMS inherently & unfixably insecure.

  • If in doubt get a new Android with an anonymous prepaid SIM that has affordable data options and use @torproject / #TorBrowser and #Orbot with #TorBridges on ports 80 & 443 which use #meek & #webtunnel transports, so any surveiling party will only see non-suspicious HTTPS traffic.

OFC a maliciously configured CPE/Router can log & report all pachets that travel through, but #DNS & #HTTP or any unencrypted comms are susceptible.

Прячемся на виду: проект TOR представил WebTunnel

12 марта, во Всемирный день борьбы с киберцензурой, группа проекта Tor официально объявила о выпуске WebTunnel, нового типа моста, предназначенного для помощи пользователям при подключении к сети Tor в регионах с жесткой цензурой. Разрабатываемый и поддерживаемый The Tor Project, WebTunnel присоединился к коллекции технологий обхода цензуры и доступен в стабильной версии Tor Browser.

Что такое WebTunnel и как он работает?

WebTunnel — это устойчивый к цензуре подключаемый транспорт, предназначенный для имитации зашифрованного веб-трафика (HTTPS), основанного на HTTPT . Он работает путем упаковки соединения полезной нагрузки в соединение HTTPS, подобно WebSocket, которое выглядит для сетевых наблюдателей как обычное соединение HTTPS (WebSocket). Таким образом это выглядит как обычное HTTP-соединение, создавая впечатление что пользователь просто просматривает веб-страницы.

Фактически, WebTunnel настолько похож на обычный веб-трафик, что может сосуществовать с веб-сайтом в одной конечной точке сети, то есть в том же домене, IP-адресе и порте. Такое сосуществование позволяет обратному-прокси пересылать как обычный веб-трафик, так и трафик WebTunnel на соответствующий сервис. В результате, когда кто-то попытается посетить веб-сайт по общему сетевому адресу, он просто воспримет содержимое этого адреса веб-сайта и не заметит существования секретного моста (WebTunnel).

nnmclub.to/forum/viewtopic.php

nnmclub.toПрячемся на виду: проект TOR представил WebTunnel мосты :: NNM-ClubTor Browser