Delivery-Date: Sat, 26 Jul 2014 03:26:45 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 479BB1E0E39
	for <archiver@seul.org>; Sat, 26 Jul 2014 03:26:43 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4509F301CB;
	Sat, 26 Jul 2014 07:26:39 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 05ECD3008F
 for <tor-talk@lists.torproject.org>; Sat, 26 Jul 2014 07:16:12 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id q_bBPSykkN5s for <tor-talk@lists.torproject.org>;
 Sat, 26 Jul 2014 07:16:11 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net", Issuer "Gandi Standard SSL CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id D40B02FE8A
 for <tor-talk@lists.torproject.org>; Sat, 26 Jul 2014 07:16:11 +0000 (UTC)
Received: from fruiteater.riseup.net (fruiteater-pn.riseup.net [10.0.1.74])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net", Issuer "Gandi Standard SSL CA" (not verified))
 by mx1.riseup.net (Postfix) with ESMTPS id D770054505
 for <tor-talk@lists.torproject.org>; Sat, 26 Jul 2014 00:16:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riseup.net; s=squak;
 t=1406358968; bh=IoHNc9PTHCOfrv6HR8rDvcRtiaAQvUPt1U1PLsLz+vA=;
 h=Date:From:To:Subject:References:In-Reply-To:From;
 b=ZDl6NDfVNEPi0dTnkFx5NVC/JrMpneNTp/PVuaLRhAqX13PdzZTH++lr5hft3ZfP+
 p9ZVbOEitc9Gk7/8SvpGsCwpeRKW09jkEz9uhGmI7gxxYvjAxNz1lB+7D7wZld6GXa
 aFXEhQnrE33rL8kuG8GPk6TH6LZ9AefIAZFaVUa0=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: mirimir@fruiteater.riseup.net)
 with ESMTPSA id 13D81EF5
Message-ID: <53D355B3.2060800@riseup.net>
Date: Sat, 26 Jul 2014 01:16:03 -0600
From: Mirimir <mirimir@riseup.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
 rv:31.0) Gecko/20100101 Thunderbird/31.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <53D16B7A.6000100@cpunk.us> <20140724203626.GS7408@moria.seul.org>
 <53D177B8.4010306@riseup.net> <20140725231953.GR7899@patternsinthevoid.net>
 <CAD2Ti28Ed0jtRmTWxd3FNiA52xMfJbwdFTy+JBVJ=MqDkr8HiA@mail.gmail.com>
In-Reply-To: <CAD2Ti28Ed0jtRmTWxd3FNiA52xMfJbwdFTy+JBVJ=MqDkr8HiA@mail.gmail.com>
X-Enigmail-Version: 1.6
X-Virus-Scanned: clamav-milter 0.98.1 at mx1
X-Virus-Status: Clean
Subject: Re: [tor-talk] Why does requesting for bridges by email require a
 Yahoo or Gmail address?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 07/25/2014 11:31 PM, grarpamp wrote:

<SNIP>

> Do we underestimate the social net in oppressed that gives
> them awareness of tor, and to obtain binary and share bridge
> info in the first place? 

Maybe we do. But what about carelessness, poor judgment and the
prevalence of informers? Wouldn't it be better to have a system that
protected bridges by design?

> Or that oppressor will not burn $cheap govt SIM and IP army
> to get and block bridges from gmail to @getbridges?

Right. Requiring hard-to-get email addresses does make it harder to get
bridge IPs. But who does that impact the most, potential users or
adversaries? Is there relevant evidence?

> This is difficult.

Indeed.

Please excuse the repetition, but DNS-based fast flux (Proximax) with
selection-based dropping of domain names associated with bridge blocking
is the best possibility that I've seen. Rather than trying to prevent
adversaries from joining the system, it recursively isolates based on
behavior.

<SNIP>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

