Delivery-Date: Fri, 03 Oct 2014 21:11:05 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 68C4C1E0B96;
	Fri,  3 Oct 2014 21:11:03 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 859EB3104A;
	Sat,  4 Oct 2014 01:10:59 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 4DD5D31043
 for <tor-talk@lists.torproject.org>; Sat,  4 Oct 2014 01:10:55 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id roxgnHwXNnq5 for <tor-talk@lists.torproject.org>;
 Sat,  4 Oct 2014 01:10:55 +0000 (UTC)
Received: from mail.ncf.ca (mail.ncf.ca [206.47.12.45])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 09D793103C
 for <tor-talk@lists.torproject.org>; Sat,  4 Oct 2014 01:10:54 +0000 (UTC)
Received: from mail.ncf.ca (localhost [127.0.0.1])
 by mail.ncf.ca (Postfix) with ESMTP id E40379F28A
 for <tor-talk@lists.torproject.org>; Fri,  3 Oct 2014 21:10:52 -0400 (EDT)
Received: from [172.16.2.5] (167-88-24-223.cpe.teksavvy.com [167.88.24.223])
 (using TLSv1 with cipher AES128-SHA (128/128 bits))
 (No client certificate requested) (Authenticated sender: fr223)
 by mail.ncf.ca (Postfix) with ESMTPSA id AEC229F225
 for <tor-talk@lists.torproject.org>; Fri,  3 Oct 2014 21:10:51 -0400 (EDT)
From: stn <stn@ncf.ca>
Message-Id: <5F5C9282-E9AA-4B93-896D-49875380CFBD@ncf.ca>
Date: Fri, 3 Oct 2014 21:10:41 -0400
To: tor-talk@lists.torproject.org
Mime-Version: 1.0 (Apple Message framework v1085)
X-Mailer: Apple Mail (2.1085)
X-NCF-Filtered: By ProxSMTP on pallando Fri Oct  3 21:10:53 2014 -0400 (EDT)
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] another video link. good stark examples of tor anonymity
	protecting people
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

https://www.youtube.com/watch?v=-hZZNFQm1Vs

more social and political change data but with more examples than the previous video mentioned regarding the very real dangers involved trying to speak one's beliefs in an oppressive regime.  worse case death.


writeup
Published on Aug 30, 2013

Tor developers Roger Dingledine and Jacob Appelbaum talk about how exactly governments are doing the blocking, both in terms of what signatures they filter in Tor (and how Tor has gotten around the blocking in each case), and what technologies they use to deploy the filters -- including the use of Western technology to operate the surveillance and censorship infrastructure in Tunisia (Smartfilter), Syria (Bluecoat), and other countries. They cover what they've learned about the mindset of the censor operators (who in many cases don't want to block Tor because they use it), and how we can measure and track the wide-scale censorship in these countries. Last, they explain Tor's development plans to get ahead of the address harvesting and handshake DPI arms races.
(Iran blocked Tor handshakes using Deep Packet Inspection (DPI) in January 2011 and September 2011. Bluecoat tested out a Tor handshake filter in Syria in June 2011. China has been harvesting and blocking IP addresses for both public Tor relays  and private Tor bridges for years.)

Category

News & Politics


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

