Delivery-Date: Sat, 10 Jan 2015 03:05:17 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY,
	URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A80431E07FB
	for <archiver@seul.org>; Sat, 10 Jan 2015 03:05:15 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4754931E85;
	Sat, 10 Jan 2015 08:05:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 811A431E4E
 for <tor-talk@lists.torproject.org>; Sat, 10 Jan 2015 08:05:07 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id TFSEv-xSoJmI for <tor-talk@lists.torproject.org>;
 Sat, 10 Jan 2015 08:05:07 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 58AFD31D39
 for <tor-talk@lists.torproject.org>; Sat, 10 Jan 2015 08:05:07 +0000 (UTC)
Received: from berryeater.riseup.net (berryeater-pn.riseup.net [10.0.1.120])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK))
 by mx1.riseup.net (Postfix) with ESMTPS id 8CD0841015
 for <tor-talk@lists.torproject.org>; Sat, 10 Jan 2015 08:05:04 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
 t=1420877104; bh=k6aGpBNJG7tizO+Y1IKtShdReaJpB4krwXWOPF82y/c=;
 h=Date:From:To:Subject:References:In-Reply-To:From;
 b=DGqQIDsrgVl6CXw2d+SIsnL8P+hRGTmLL+tem00EXe+sndm/czuP+TEbIjsiTT8Um
 HsNVjBAYhDxWp1mHsHLf0vyY7+0Jnnv73/bxgqMtdxwjRAKk61fma54SRlmtFwnhyX
 Lfabc6U7HVeZ97dGWhtYIJLx0IvaYAMzxUugbkpE=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: eliaz) with ESMTPSA id 63C9040085
Message-ID: <54B0DD1D.7070008@riseup.net>
Date: Sat, 10 Jan 2015 08:04:45 +0000
From: eliaz <eliaz@riseup.net>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <54AAA6E4.2010003@whonix.org>
In-Reply-To: <54AAA6E4.2010003@whonix.org>
X-Virus-Scanned: clamav-milter 0.98.5 at mx1
X-Virus-Status: Clean
Subject: [tor-talk] documentation for Windows users
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

I began using Tor a couple of years ago, not so much because I needed a
secure client as because I wanted to help the network by running a
bridge. At the time I jumped in I was running Windows. I'm still running
Tor on that OS.

It was very easy to set up a bridge. However it was a long struggle to
understand how the bridge was supposed to be working and how I might
track its behavior. Vidalia is no longer integrated into the browser,
and portable transports & different tracking mechanisms have come in.

I think my difficulties arose mostly because (1) the documentation is
oriented toward linux users, and (2) some of the documentation hasn't
yet caught up with the improvements and elaborations. For a while I've
been wanting to review the documentation and propose some changes.

I have a day job, and though the documentation has been nagging at me
I'm not sure when I'll be able to get to it. But the first thing would
be to ascertain whether there are enough Windows client/bridge users to
make the project worthwhile. So I'm here are asking for any of the
following stats:

1. What percentage of Tor users are running it on Windows?

2. What percentage of the Windows users run a client only?

3. What percentage run solely or mostly a bridge or bridges?

(That is, in 2 & 3 I'm trying to get a sense of the overlap of Windows
clients and bridges, which would influence any documentation I might
come up with.)

Thanks for any help and comments - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

