Delivery-Date: Tue, 23 Jun 2015 03:35:09 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id BCCC71E0D2B;
	Tue, 23 Jun 2015 03:35:07 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AE132366EC;
	Tue, 23 Jun 2015 07:35:01 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1407F366EB
 for <tor-talk@lists.torproject.org>; Tue, 23 Jun 2015 07:34:59 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id GI3r0X_wfHSm for <tor-talk@lists.torproject.org>;
 Tue, 23 Jun 2015 07:34:59 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id E2AF1366D1
 for <tor-talk@lists.torproject.org>; Tue, 23 Jun 2015 07:34:58 +0000 (UTC)
Received: from berryeater.riseup.net (berryeater-pn.riseup.net [10.0.1.120])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK))
 by mx1.riseup.net (Postfix) with ESMTPS id DC1304103C
 for <tor-talk@lists.torproject.org>; Tue, 23 Jun 2015 07:34:55 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
 t=1435044895; bh=eqtJbFVmDrYGYfFf7FvklFDzmkmVmzKm4YMUnYlaybI=;
 h=To:From:Subject:Date:From;
 b=JgiSnz9gwxlxluMYi6dPpgqJy8hbdfYEYYz0zdCybT3mfvFafgfQUHWCJu2lreNeX
 TdL3PXcPibWH9Pk2DK69K2ltvK+rYt+R9zZ0ZT0RPJHn7ZuehBvC2mFhKpDwg79mTu
 xrY4OnwNuyAHWW5ztSjlkFGWcfMFICSdU9fttf9I=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: thomaswhite) with ESMTPSA id 52E8A40E03
To: tor-talk@lists.torproject.org
From: Thomas White <thomaswhite@riseup.net>
X-Enigmail-Draft-Status: N1110
Message-ID: <55890C19.2000705@riseup.net>
Date: Tue, 23 Jun 2015 08:34:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101
 Thunderbird/38.0.1
MIME-Version: 1.0
X-Virus-Scanned: clamav-milter 0.98.7 at mx1
X-Virus-Status: Clean
Subject: [tor-talk] Bridges vs Guards
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Are there any performance tradeoffs or differences between the use of
a regular guard node or the use of a bridge, assuming the hardware and
uplinks etc were identical and were controlled by myself for use in
high capacity hidden service clusters?

T


- -- 
Activist, anarchist and a bit of a dreamer.
Keybase: https://keybase.io/thomaswhite

PGP Keys: https://www.thecthulhu.com/pgp-keys/
Current Fingerprint: 86D0 B421 FFB5 311A C6BF 0966 80BE 859C 5C2E 5FE4
Master Fingerprint: DDEF AB9B 1962 5D09 4264 2558 1F23 39B7 EF10 09F0

Twitter: @CthulhuSec
XMPP: thecthulhu at jabber.ccc.de
XMPP-OTR: 77E6C8C6 95FDE863 1172A1E1 8C114C01 691398AC
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=8byP
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

