nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#obfs4

0 Beiträge0 Beteiligte0 Beiträge heute
Two Tooting Tor Nodes<p>In the last 24h we created 81 GB traffic.<br>Flaky: 10 GB, Obsy: 71 GB</p><p>Have a nice evening with free access to the internet.<br>Obsy and Flaky</p><p><a href="https://social.di2.io/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a> <a href="https://social.di2.io/tags/torproject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>torproject</span></a> <a href="https://social.di2.io/tags/tornetwork" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tornetwork</span></a> <a href="https://social.di2.io/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> <a href="https://social.di2.io/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> same with <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> bridges: there is no option to say like <code>ports=80,443</code> or similar, which makes it cumbersome to get said bridges.</p><ul><li>And yes, for people stuck on <a href="https://infosec.space/tags/publicWiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>publicWiFi</span></a> and shitty <a href="https://infosec.space/tags/MVNO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MVNO</span></a>|s this is most likely the only way they can get any <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> connection work through <a href="https://infosec.space/tags/CGNAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CGNAT</span></a> and <a href="https://infosec.space/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>|s, as most do <a href="https://infosec.space/tags/BlockTor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlockTor</span></a> and it's associated <a href="https://infosec.space/tags/ports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ports</span></a> alongside common <a href="https://infosec.space/tags/proxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxy</span></a> ports like 8000-9999 and anything they can't <a href="https://infosec.space/tags/MITM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MITM</span></a> that isn't <a href="https://infosec.space/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> or <a href="https://infosec.space/tags/IMAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMAP</span></a>!</li></ul><p>And trying to get places to <a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DontBlockTor</span></a> that criminalize the use of <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> is foolish at best.</p><ul><li>I mean, I'm glad that I'm in <a href="https://infosec.space/tags/Germany" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Germany</span></a> and whilst <a href="https://infosec.space/tags/Hosters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosters</span></a> <a href="https://contabo.com/en/legal/terms-and-conditions/" rel="nofollow noopener noreferrer" target="_blank">do ban Tor</a> in their <a href="https://infosec.space/tags/ToS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToS</span></a>, my <a href="https://infosec.space/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> can't ban me from operating a <a href="https://infosec.space/tags/relay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relay</span></a> or <a href="https://infosec.space/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a> at home...</li></ul>
Kevin Karhan :verified:<p><a href="https://infosec.space/tags/WhatsMissing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsMissing</span></a>: A tool to check if <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> are still available/online/reachable that one can use either <a href="https://infosec.space/tags/standalone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standalone</span></a> (with <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and/or <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> Expert Bundle) or on <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a>. </p><ul><li>Cuz I do run into issues and kinda want to sort <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> by availability so I don't waste time on a <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a> that is down and also thin-out the list of bridges that ain't online anymore.</li></ul><p>Whilst I do acknowledge that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> do disrecommend having a huge list of Tor Bridges on hand, I do regularly need them for contacts who are behind a <a href="https://infosec.space/tags/GreatFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreatFirewall</span></a> and can't <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel out of it.</p><ul><li>Sadly <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> <a href="https://bridges.torproject.org" rel="nofollow noopener noreferrer" target="_blank">doesn't offer</a> good <a href="https://infosec.space/tags/filtering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>filtering</span></a> options so one can't just query types effectively like <em>"I need <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> on <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a>"</em> or <em>"I can only use Ports 80 &amp; 443 on <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a>"</em> which may work.</li></ul><p>Espechally being able to filter for <a href="https://infosec.space/tags/IPv4only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4only</span></a> and not just <a href="https://infosec.space/tags/IPv6only" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6only</span></a> is something I miss, alongside the filter for <a href="https://infosec.space/tags/PluggableTransports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PluggableTransports</span></a> type as <span class="h-card" translate="no"><a href="https://social.librem.one/@guardianproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>guardianproject</span></a></span> <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Orbot</span></a> seems to only handle <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> and not webtunnel or <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> at all...</p><ul><li>I'm pretty certain that merely pinging a bridge at it's port isn't working as a shure-fire way to check for it's availability.</li></ul>
Da Linux beardude<p>I wish I could run a Bridge of obfs4 but I don't pay the bills to run an ordinateur 24/7 and I don't have a stable job to be able to pay a VPS monthly. I don't even think there's a free VPS I can use forevah.</p><p>Plus I read that needs static IP ? Umm, home networks don't have static IP, lol</p><p><a href="https://mastodon.social/tags/torproject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>torproject</span></a> <a href="https://mastodon.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <a href="https://mastodon.social/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> <a href="https://mastodon.social/tags/onion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onion</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a> <a href="https://mastodon.social/tags/snowflakeproxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflakeproxy</span></a> <a href="https://mastodon.social/tags/gnu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnu</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tails</span></a> <a href="https://mastodon.social/tags/torbrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>torbrowser</span></a> <a href="https://mastodon.social/tags/orbot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>orbot</span></a></p>
Habr<p>Лучшие бесплатные VPN для ПК и смартфона 2025 (которые работают)</p><p>В последние несколько лет на территории РФ ужесточилась фильтрация интернет-трафика средствами ТСПУ. Сотни сайтов и интернет-сервисов внесены в чёрные списки и заблокированы. Получить доступ к ним можно только через VPN. Однако самые популярные VPN тоже подверглись блокировке. Ограничения можно обойти через канал на собственном зарубежном сервере, купив там самый дешёвый хостинг за пару долларов или уже готовый VPS с установленным VPN (такие объявления есть на Авито ). Если своего сервера нет, то остаётся только прибегнуть к услугам сторонних VPN-сервисов, которые ещё не заблокированы. Лучшие бесплатные VPN из выживших перечислены ниже. Примечание . Эту статью Хабр наверняка заблокирует для пользователей из РФ, в исполнение запрета Роскомнадзора на информацию об обходе блокировок, так что лучше сразу после публикации сохранить её.</p><p><a href="https://habr.com/ru/articles/881878/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/881878/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%8B%D0%B9_VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>бесплатный_VPN</span></a> <a href="https://zhub.link/tags/Opera" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Opera</span></a> <a href="https://zhub.link/tags/%D0%A1%D0%9E%D0%A0%D0%9C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>СОРМ</span></a> <a href="https://zhub.link/tags/%D0%A2%D0%A1%D0%9F%D0%A3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ТСПУ</span></a> <a href="https://zhub.link/tags/%D0%A0%D0%BE%D1%81%D0%BA%D0%BE%D0%BC%D0%B8%D0%BD%D0%B0%D0%B4%D0%B7%D0%BE%D1%80" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Роскоминадзор</span></a> <a href="https://zhub.link/tags/%D0%A0%D0%9A%D0%9D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>РКН</span></a> <a href="https://zhub.link/tags/%D1%86%D0%B5%D0%BD%D0%B7%D1%83%D1%80%D0%B0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>цензура</span></a> <a href="https://zhub.link/tags/%D1%84%D0%B8%D0%BB%D1%8C%D1%82%D1%80%D0%B0%D1%86%D0%B8%D1%8F_%D1%82%D1%80%D0%B0%D1%84%D0%B8%D0%BA%D0%B0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>фильтрация_трафика</span></a> <a href="https://zhub.link/tags/IPSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPSec</span></a> <a href="https://zhub.link/tags/L2TP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>L2TP</span></a> <a href="https://zhub.link/tags/IKEv2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IKEv2</span></a> <a href="https://zhub.link/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a> <a href="https://zhub.link/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> <a href="https://zhub.link/tags/%D0%94%D0%A6%D0%9E%D0%90" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ДЦОА</span></a> <a href="https://zhub.link/tags/RDPru" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RDPru</span></a> <a href="https://zhub.link/tags/%D0%BE%D0%B1%D1%85%D0%BE%D0%B4_%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%BE%D0%BA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>обход_блокировок</span></a> <a href="https://zhub.link/tags/Psiphon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Psiphon</span></a> <a href="https://zhub.link/tags/RedShield" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedShield</span></a> <a href="https://zhub.link/tags/TurboVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TurboVPN</span></a> <a href="https://zhub.link/tags/VPN_Proxy_Master" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN_Proxy_Master</span></a> <a href="https://zhub.link/tags/AdGuard_VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AdGuard_VPN</span></a> <a href="https://zhub.link/tags/AntiZapret" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AntiZapret</span></a> <a href="https://zhub.link/tags/Hola" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hola</span></a> <a href="https://zhub.link/tags/NordVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NordVPN</span></a> <a href="https://zhub.link/tags/Shadowsocks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shadowsocks</span></a> <a href="https://zhub.link/tags/%D0%BE%D0%B1%D1%84%D1%83%D1%81%D0%BA%D0%B0%D1%82%D0%BE%D1%80%D1%8B" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>обфускаторы</span></a> <a href="https://zhub.link/tags/WARP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WARP</span></a> <a href="https://zhub.link/tags/Amnezia_VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amnezia_VPN</span></a> <a href="https://zhub.link/tags/AmneziaWG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AmneziaWG</span></a> <a href="https://zhub.link/tags/Karing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Karing</span></a> <a href="https://zhub.link/tags/NekoRay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NekoRay</span></a> <a href="https://zhub.link/tags/%D0%BF%D1%80%D0%BE%D0%BA%D1%81%D0%B8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>прокси</span></a> <a href="https://zhub.link/tags/Exclave" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exclave</span></a> <a href="https://zhub.link/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <a href="https://zhub.link/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a> <a href="https://zhub.link/tags/meekazure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meekazure</span></a> <a href="https://zhub.link/tags/Snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snowflake</span></a> <a href="https://zhub.link/tags/WebTunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnel</span></a> <a href="https://zhub.link/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://zhub.link/tags/%D0%90%D0%BD%D1%82%D0%B8%D0%97%D0%B0%D0%BF%D1%80%D0%B5%D1%82" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>АнтиЗапрет</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://chaos.social/@wmd" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>wmd</span></a></span> <span class="h-card" translate="no"><a href="https://denden.world/@miqokin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>miqokin</span></a></span> I've yet to find a nation that <a href="https://chaos.social/@wmd/113899189531053167" rel="nofollow noopener noreferrer" target="_blank">criminalizes</a> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> but not <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a>|s that facilitate the same...</p><ul><li>Also commercial VPN providers are relatively easy to detect, filter &amp; block unless they support <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunneling.</li></ul><p>Whereas <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> has multiple ways to circumvent <a href="https://infosec.space/tags/InternetCensorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetCensorship</span></a>, includibg multiple <a href="https://infosec.space/tags/proxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxy</span></a> &amp; 9bfuscation systems like <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a>, <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> and regular <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> on included, public query-able amd private lists...</p>
AS 396507<p>Recently we upgraded our <a href="https://digitalcourage.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://digitalcourage.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> bridge relay from Ubuntu 22.04 to 24.04. Unfortunately we missed a permissions issue with obfs4 that changed with the upgrade. This kept Tor in a restart loop and prevented anyone from using the bridges. This has been corrected.</p><p>This were the errors:</p><p>[warn] Server managed proxy encountered a method error. (obfs4 listen tcp 23.129.64.90:443: bind: permission denied)</p><p>[warn] Managed proxy '/usr/bin/obfs4proxy' was spawned successfully, but it didn't launch any pluggable transport listeners!</p><p>We also have a <a href="https://digitalcourage.social/tags/WebTunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnel</span></a> bridge that was not affected since it's on the disobey.net server.</p><p><a href="https://emeraldonion.org/bridges/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">emeraldonion.org/bridges/</span><span class="invisible"></span></a></p>
Kevin Karhan :verified:<p>One thing that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> is missing is a way to check availability and reachability of <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> with a simple tool. </p><ul><li>This is kinda vital as I do occasionally setup private <a href="https://infosec.space/tags/bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridges</span></a> and also want to enshure the private <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> list I have is up to date.</li></ul><p>Manually adding/removing one <a href="https://infosec.space/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a> after the other in <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and see if those connect is a relatively inefficient process and merely pinging them isn't viable either, espechally on <a href="https://infosec.space/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://infosec.space/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> and <a href="https://infosec.space/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> type bridges.</p><ul><li>Now to make the obvious clear: I'd <em>NEVER</em> publicly list any <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a> on my <a href="https://github.com/greyhat-academy/lists.d" rel="nofollow noopener noreferrer" target="_blank">lists.d repo</a> obviously, because that would only harm <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a>... </li></ul><p>I'm not even asking for like a fancy tool that is as clean as <span class="h-card" translate="no"><a href="https://infosec.exchange/@micahflee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>micahflee</span></a></span> 's <a href="https://infosec.space/tags/OnionShare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionShare</span></a> but merely a <a href="https://infosec.space/tags/CLI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CLI</span></a> thing (if necessary I'd build some <a href="https://infosec.space/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a> script) to automatically attempt to connect to said bridge and either spit out an <em>ok</em> or <em>error</em>. </p><ul><li>Something one can just feed with a text file and that'll spit out a different file with ok/working bridges and/or discards the non-working ones from the list.</li></ul><p>And yes, this tool is kinda crucial as I want to quickly sift through a load of bridges that work on restricted ports (22, 80, 443) and thus can bypass the <a href="https://infosec.space/tags/GreatFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreatFirewall</span></a> and <a href="https://infosec.space/tags/Roskomnadzor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Roskomnadzor</span></a> filtering...</p><ul><li>So people fleeing can at least safely communicate.</li></ul><p>If anyone at <a href="https://infosec.space/tags/TorProject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorProject</span></a> needs more details, I'll gladly exchange them in a secure manner. </p><ul><li>I also applied for a <a href="https://infosec.space/tags/gitlab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gitlab</span></a> account so I can help improve <a href="https://infosec.space/tags/documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>documentation</span></a> (ideally with some nice step-by-step screenshots so even <em>"<a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliterates</span></a>"</em> can i.e. add a <a href="https://infosec.space/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a>)...</li></ul>
Tarnkappe.info<p>📬 WebTunnel-Brücken: Tor braucht eure Hilfe gegen Internet-Zensur<br><a href="https://social.tchncs.de/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://social.tchncs.de/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzpolitik</span></a> <a href="https://social.tchncs.de/tags/digitaleFreiheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleFreiheit</span></a> <a href="https://social.tchncs.de/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <a href="https://social.tchncs.de/tags/TORNetzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TORNetzwerk</span></a> <a href="https://social.tchncs.de/tags/TorProjekt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorProjekt</span></a> <a href="https://social.tchncs.de/tags/WebTunnelBr%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnelBrücken</span></a> <a href="https://social.tchncs.de/tags/ZensurimInternet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZensurimInternet</span></a> <a href="https://sc.tarnkappe.info/b67906" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/b67906</span><span class="invisible"></span></a></p>
lucy<p>悟已往之不谏,知来者之可追。<br>实迷途其未远,觉今是而昨非。<br>陶渊明 《归去来辞》</p><p>How to use Tor to climb the Great Fire Wall?</p><p>4、使用软件 Tor<br> <br> Windows 系统, 点击 Tor 的快捷方式图标即可。<br> <br> Linux 系统,启动 Tor 浏览器的方法大同小异。<br> 通用方法是:<br> A、<br> 进入 ~/tor-browser 文件夹,在该目录下,打开 terminal 运行命令:<br> $ ./start-tor-browser.desktop<br> 可以启动 Tor 浏览器。<br> <br> B、<br> 或者进入下级目录 ~/tor-browser/Browser 文件夹,在该目录下,打开 terminal 运行命令:<br> $ ./start-tor-browser <br> 可以启动 Tor 浏览器。</p><p> 如果上述命令不能执行,请将相应文件,改为可以执行状态。<br> 例如:start-tor-browser.desktop -&gt; Properties -&gt;Permissions -&gt;Program:Allow this file to run as a program (勾选)-&gt; Close.<br> 或者在该目录下运行:$ chmod u+x start-tor-browser.desktop<br> <br> 某些 Linux 系统,每次都要运行命令行,启动 Tor 浏览器;<br> 某些 Linux 系统第一次启动 Tor 浏览器之后,下次就可以鼠标左键,双击 start-tor-browser.desktop,启动 Tor 浏览器;<br> 某些 Linux 系统第一次,就可以鼠标左键,双击 start-tor-browser.desktop, 启动 Tor 浏览器; <br> 某些 Linux 系统第一次,鼠标左键,双击 start-tor-browser.desktop 启动 Tor 浏览器时,会提示 “Mark as Trusted" 或者 "Mark Executable", 确认后,下次,双击就可以启动。<br> 也可以鼠标右键,单击,然后选择 "Execute" 或者 "Run as a Program"(不同 Linux OS, 选项表达方式不一样),启动 Tor 浏览器。<br> 如果启动 Tor 浏览器, 遇到问题,请多尝试。</p><p> 如果 Linux 系统更新后,Tor 无法使用。可能解决方法,删除 tor-browser 文件夹, 重新安装 Tor,<br> 运行命令: 以目前最新版本 Tor*.13.0.14 为例, 请修改为相应的版本号。<br> $ tar -xvf /home/User_Name/Downloads/tor-browser-linux-x86_64-13.0.14.tar.xz<br> <br> 如果操作系统语言是英文,Tor 显示语言也会是英文,可以改为中文界面。<br> 打开 Tor 浏览器, 右上角有三短横线,点击, <br> Settings -&gt; General -&gt; Language(下拉,选择)-&gt; 简体中文(zh-CN), 然后重启 Tor 浏览器,就是中文界面了。<br> <br> 或者,在启动 Tor 浏览器时, 在 Tor 的顶部,会有提示询问:<br> “Tor Browser has set your display language to English based on your system's language. Change Language..."<br> 点击”Change Language...", 按照上述方法,改为自己喜欢的语言。<br> <br>4.1 VPN + Tor: 运行 VPN 联网, 运行 Tor, 在 Tor 开始界面选择 "连接/Connect", 即可。<br> 很久很久以前,如果是 VPN + Tor, 则需要在 Tor 浏览器, 手工配置各种端口,现在则不必了。<br> <br> Tor 官方不建议使用 VPN + Tor。<br> 因为某些人使用的 VPN 不安全,本身就是蜜罐,是间谍软件,比如 ”老王 VPN“, 以及各种能够以微信、支付宝,付费购买的机场(翻墙软件、节点)。<br> <br> <br>4.2 单独运用 Tor,即不同时运行 VPN。<br> Tor 目前提供了四种 “可插拔式传输器/Pluggable Transports" 连接方式:网桥 obfs4, meek-azure, Snowflake, WebTunnel。<br> <br> Tor 本身会内置一些 obfs4 网桥, 但是在中国,绝大多数 obfs4 网桥无法使用,所以可以尝试手工获取新的 obfs4 网桥。<br> <br> WebTunnel 网桥 , 获取方法与 obfs4 一样。<br> 以 WebTunnel 为例:<br> 可以使用普通浏览器,例如 firefox, chrome(google), 也可以使用 Tor, 打开网址:<br> <a href="https://bridges.torproject.org/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">bridges.torproject.org/</span><span class="invisible"></span></a><br> 或者:<br> <a href="https://bridges.torproject.org/options" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">bridges.torproject.org/options</span><span class="invisible"></span></a><br> <br> 选择获取网桥,可以看到一个方框内显示 obfs4, 利用旁边的向下箭头,选择 WebTunnel,<br> 然后出现验证码页面,是大小写字母与数字组合,手工输入字母、数字,确认大小写字母、数字是否正确无误,然后请亲自回车(点击 Enter 键),<br> 接着就会出现 WebTunnel, 选择“复制/copy”, 可以将 WebTunnel 网桥连接保存在专门的文件。<br> <br> obfs4 网桥连接, 在中国,绝大多数不可以使用,所以除非测试,否则不必特意去手工获取。<br> <br> 举例:网桥连接<br> “obfs4 一串字符”<br> “webtunnel 一串字符”<br> <br> NG: 在中国,基本不可用 (No Good)。</p><p> A、 obfs4, 将上网流量伪装成随机数据流量:<br> obfs4 网桥连接, 在中国,绝大多数情况,不可以使用。如果想测试 obfs4 网桥连接,方法是:<br> 打开 Tor 浏览器 -&gt; 配置连接 -&gt; 选择内置网桥 -&gt; obfs4(内置)(选择)-&gt; 连接(点击).<br> 或者:<br> 打开 Tor 浏览器 -&gt; 配置连接 -&gt; 手工添加网桥 -&gt; 复制、粘贴已经手工获取的 obfs4 网桥 -&gt; 连接(点击).<br> 可能有万分之一的机会,某个 obfs4 网桥, 在中国可以联网, 打开 Tor 搜索界面,搜索,并能反馈搜索结果。<br> <br> 如果因为测试 obfs4 网桥连接,后来使用 VPN + Tor 时, 不能连接,<br> 可能解决方法:<br> 打开 Tor 浏览器 -&gt; 配置连接 -&gt; 移除所有网桥 -&gt; 重新连接 Tor 浏览器。<br> <br> B、 meek-azure, 将上网流量伪装成访问 Microsoft Azure 网络服务的正常流量:<br> 打开 Tor 浏览器 -&gt; 配置连接 -&gt; 选择内置网桥 -&gt; meek-azure(选择)-&gt; 连接(点击).<br> 能打开 Tor 浏览器搜索界面,但是,实际搜索时,会结果超时,不可用。<br> <br>OK: 可以联网,速度较快。</p><p> C、Snowflake, 将上网流量伪装成视频通话:<br> 打开 Tor 浏览器 -&gt; 配置连接 -&gt; 选择内置网桥 -&gt; Snowflake(选择)-&gt; 连接(点击).<br> <br> D、WebTunnel, 将上网流量伪装成普通的 HTTPS 流量:<br> 打开 Tor 浏览器 -&gt; 配置连接 -&gt; 手工添加网桥 -&gt;复制、粘贴已经手工获取的 WebTunnel 网桥 -&gt;连接(点击).<br> Tor, 于2023年10月,开始测试 WebTunnel 网桥模式, 2024年3月12日,正式全球推出 WebTunnel 网桥模式。<br> WebTunnel 不适用于小于或等于 Tor Browser (12.5.x)的版本,所以,请下载使用最新 Tor 版本。<br> 目前看来,WebTunnel 速度比 Snowflake 快。<br> <br>小结:单独使用 Tor, 即不同时运行 VPN。<br>meek-azure, Snowflake:为 Tor 内置网桥, 无需手工获取。 在中国,meek-azure 基本不可用; Snowflake 可以联网。<br>obfs4, WebTunnel: obfs4, Tor 本身有内置, 也可以手工获取; WebTunnel, 必须手工获取。 在中国,obfs4 基本不可用; WebTunnel 可以联网。</p><p>个人使用 Tor 经验:<br>Tor 内置网桥 Snowflake 可以单独联网。<br>如果不能联网,可以在不同时间尝试联网, 比如:上午、下午,晚上,今天,明天。<br>尝试在不同虚拟机内联网。<br>请耐心多尝试几次,一定可以翻越防火墙,来到自由世界。<br> <br>笑傲江湖:<br> 西元2024年3月5日上午开始,至2024年3月11日下午结束, 左冷禅与岳不群,在嵩山之巅,召开五岳剑派大会。<br> 期间, Tor 网络遭受严重攻击, 平常可能不到一分钟,就可以连接 Tor 网络。<br> 大会期间,则需要一分钟到两分钟,甚至更长时间,才可以连接 Tor 网络。<br> 开完大会之后当天晚上,则是恢复到平常,不到一分钟就可以连接 Tor 网络。<br> <br> “魔高一尺,道高一丈。”<br> 道与魔,不断斗争,不断进化。<br> 可以预计,网络防火长城(The Great Fire Wall) 会想方设法封锁 WebTunnel。<br> 没有完美的矛,也没有完美的盾。<br> 所谓固若金汤的网络防火长城(The Great Fire Wall) ,实则千疮百孔。<br> "破山中贼易,破心中贼难。"<br> 翻越网络防火长城,很容易;打破心中围墙,很困难。<br> 以至于某些人即使肉身翻墙,或者网络翻墙,还是自我囚禁于从小所接受的洗脑教育之牢房。<br> 古代贫苦民众没有机会读书。<br> 现在网络时代,独裁政权则一方面给民众喂食垃圾、有毒信息;一方面限制民众自由访问网络,获取信息。<br> 只是网络防火长城(The Great Fire Wall) 则是民脂民膏筑成,却用来愚弄民众,以保护权贵万年统治。<br> ”兴,百姓苦;亡,百姓苦。“<br> 实在是可悲。<br> <br> <br> 参考资料:<br> <br> 英文:<br> Hiding in plain sight: Introducing WebTunnel<br> <a href="https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.torproject.org/introducin</span><span class="invisible">g-webtunnel-evading-censorship-by-hiding-in-plain-sight/</span></a><br> <br> Tor Browser Launcher<br> <a href="https://github.com/torproject/torbrowser-launcher" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/torproject/torbrows</span><span class="invisible">er-launcher</span></a><br> <br> Tor Plus VPN<br> <a href="https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.torproject.org/legacy/t</span><span class="invisible">rac/-/wikis/doc/TorPlusVPN</span></a><br> <br> <br> 中文:<br> Tor 浏览器安装<br> <a href="https://oniondocs.gitlab.io/tbmanual/zh-CN/installation/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">oniondocs.gitlab.io/tbmanual/z</span><span class="invisible">h-CN/installation/</span></a><br> <br> 阮晓寰/编程随想的博客/ Tor 相关章节<br> <a href="https://program-think.blogspot.com/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">program-think.blogspot.com/</span><span class="invisible"></span></a><br> <br> 数字极权时代生存手记 v4.0 已上线/ Tor 相关章节<br> <a href="https://reconsidera.github.io/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">reconsidera.github.io/</span><span class="invisible"></span></a><br> <br>附<br>老生常谈:<br>手机不安全,所以尽量避免在手机上使用;<br>电脑是原装系统,不是中国品牌,<br>没有安装任何中国软件,<br>包括(但不限于):搜狗输入法、微信、QQ、抖音、TIKTOK, 等等。<br>其实,<br>如果设备(电脑、手机)本身硬件上有木马,安装了木马程序(搜狗输入法、微信、抖音等等),<br>再安全的软件,也毫无作用。</p><p>请各位方家指正,谢谢。</p><p>(完,2/2)</p><p><a href="https://alive.bar/tags/%E7%BF%BB%E5%A2%99" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>翻墙</span></a> <a href="https://alive.bar/tags/%E7%BF%BB%E7%89%86" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>翻牆</span></a> <a href="https://alive.bar/tags/fanqiang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fanqiang</span></a> <a href="https://alive.bar/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://alive.bar/tags/WebTunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnel</span></a> <a href="https://alive.bar/tags/Snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snowflake</span></a> <a href="https://alive.bar/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <a href="https://alive.bar/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>-azure</p><p><span class="h-card"><a href="https://ovo.st/club/board" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>board</span></a></span></p>
lucy<p>众里寻他千百度,蓦然回首,那人却在,灯火阑珊处。 辛弃疾 《青玉案》</p><p>How to use Tor to climb the Great Fire Wall?</p><p>结论:目前(2024年), 在中国, Tor 翻墙可用方法是:</p><p>1、VPN + Tor 可以联网; </p><p>2、单独使用 Tor: <br> 网桥 Snowflake, WebTunnel 可以联网。<br> Tor 内置网桥 Snowflake; 网桥 WebTunnel 需要手工获取。<br> 注意:网桥 obfs4, meek-azure, 基本不可用。</p><p>以下简介如何使用软件 Tor 翻墙:</p><p>1、下载软件 Tor<br> 下载地址:无论英文、中文下载地址,下载回来的软件,默认是英文界面,可以改为中文界面。<br> 英文:需要保持 VPN 联网。<br> <a href="https://www.torproject.org/download/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">torproject.org/download/</span><span class="invisible"></span></a><br> <br> 中文:需要保持 VPN 联网。<br> <a href="https://www.torproject.org/zh-CN/download/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">torproject.org/zh-CN/download/</span><span class="invisible"></span></a><br> <br> 如果不能翻墙,可以从 Tor 官方指定的镜像网站下载: 免翻墙。<br> <a href="https://tor.calyxinstitute.org/zh-CN/download/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tor.calyxinstitute.org/zh-CN/d</span><span class="invisible">ownload/</span></a><br> <br> 利用海外邮箱,发邮件给 gettor@torproject.org ,获取下载链接。<br> 邮件标题注明 "windows“、”osx“ 或 ”linux“ 来指定平台版本(不含引号)。邮件正文可以为空。<br> 请勿使用中国邮箱。<br> 可惜下载地址是:drive.google.com,archive.org,都需要打开 VPN 联网。<br> 不如直接去 Tor 官网,或者 Tor 镜像网站下载。<br> <br> Tor 项目提到,如果使用 Telegram,可以关注器人 <a href="https://t.me/gettor_bot" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">t.me/gettor_bot</span><span class="invisible"></span></a> , 来获取下载 Tor 的链接。<br> 考虑到在中国注册和使用 Telegram, 很危险,所以不推荐这种方法。<br> <br> Debian, Ubuntu, Fedora 等 Linux OS, 可以利用命令安装 tor-browser。<br> $ sudo apt install torbrowser-launcher # Debian <br> $ sudo dnf install torbrowser-launcher # Fedora<br> $ torbrowser-launcher # 下载,安装,并自动校验最新版本的 Tor。 这时需要打开 VPN 联网。<br> <br> 某个 Linux OS 可以直接用命令下载,并安装最新版本 Tor。<br> 无需打开 VPN 联网。因为是从这个 Linux OS 发行版的服务器下载。<br> $ sudo apt install tor-browser<br> <br> <br>2、校验下载的软件 Tor<br> 要养成良好的习惯,校验这一步非常重要。如果下载的软件被人篡改,很危险,后果很严重。<br> 参看:<br> How can I verify Tor Browser's signature?<br> <a href="https://support.torproject.org/tbb/how-to-verify-signature/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">support.torproject.org/tbb/how</span><span class="invisible">-to-verify-signature/</span></a><br> <br> 或者 ”Tor 中文指南“ 关于 Windows 系统如何校验 Tor 软件的文章。<br> <span class="h-card"><a href="https://mastodon.social/@tor4zh" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tor4zh</span></a></span><br> <br> 或者鄙人所写的 《Linux OS, 如何校验下载的软件 Tor?》<br> <br>3、安装软件 Tor<br> Windows 系统,点击 Tor*.exe 文件安装即可。<br> <br> Linux 系统安装 Tor 软件:<br> 假设下载的 Tor 软件保存在 Downloads 文件夹, 以目前最新版本 Tor*.13.0.14 为例, 2024年4月16日发布。<br> $ tar -xvf /home/User_Name/Downloads/tor-browser-linux-x86_64-13.0.14.tar.xz<br> <br> # 请将 ”User_Name“ 替换为你的 Linux 系统用户名字。不要使用 sudo。<br> tar 命令参数解释:<br> -x : It extracts the content from the archive file.<br> -v : This option shows the detailed or verbose information.<br> -f : This option is used to specify the archive file.<br> <br> 卸载 Tor:<br> 直接删除 tor-browser 这个文件夹,就可以了。<br> <br> (未完,1/2 )</p><p><a href="https://alive.bar/tags/%E7%BF%BB%E5%A2%99" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>翻墙</span></a> <a href="https://alive.bar/tags/%E7%BF%BB%E7%89%86" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>翻牆</span></a> <a href="https://alive.bar/tags/fanqiang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fanqiang</span></a> <a href="https://alive.bar/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://alive.bar/tags/WebTunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebTunnel</span></a> <a href="https://alive.bar/tags/Snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snowflake</span></a> <a href="https://alive.bar/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <a href="https://alive.bar/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>-azure</p><p><span class="h-card"><a href="https://ovo.st/club/board" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>board</span></a></span></p>
AS 396507<p>On this <a href="https://digitalcourage.social/tags/GivingTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GivingTuesday</span></a>, we are launching 10 public <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> <a href="https://digitalcourage.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> bridges!</p><p>We don't expect these bridges to be particularly good at evading <a href="https://digitalcourage.social/tags/government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>government</span></a> <a href="https://digitalcourage.social/tags/censorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>censorship</span></a> since they are in the same IPv4 /24 subnet as our exit relays. Countries like China and Russia undoubtably already block our subnet. However, we think they are a trustworthy (and fast) guard node when configured.</p><p>If you'd like to try one of our bridges, we have published them here:</p><p><a href="https://bridge.emeraldonion.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bridge.emeraldonion.org</span><span class="invisible"></span></a></p><p>Please consider <a href="https://digitalcourage.social/tags/donating" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>donating</span></a> to U.S. 501(c)(3) tax-deductible <a href="https://digitalcourage.social/tags/nonprofit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nonprofit</span></a> Tor network operators before the end of the year:</p><p>Emerald Onion: <a href="https://emeraldonion.org/donate/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">emeraldonion.org/donate/</span><span class="invisible"></span></a></p><p>Calyx Institute <span class="h-card" translate="no"><a href="https://mastodon.social/@calyxinstitute" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>calyxinstitute</span></a></span>: <a href="https://members.calyxinstitute.org/donate" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">members.calyxinstitute.org/don</span><span class="invisible">ate</span></a></p><p>Stormy Cloud <span class="h-card" translate="no"><a href="https://mastodon.social/@stormycloud" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>stormycloud</span></a></span>: <a href="https://stormycloud.org/donate/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">stormycloud.org/donate/</span><span class="invisible"></span></a></p><p>Riseup <span class="h-card" translate="no"><a href="https://mastodon.social/@riseup" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>riseup</span></a></span>: <a href="https://riseup.net/donate" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">riseup.net/donate</span><span class="invisible"></span></a></p><p>(if there are any other that we missed, please let us know!)</p><p><a href="https://digitalcourage.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://digitalcourage.social/tags/anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anonymity</span></a> <a href="https://digitalcourage.social/tags/TorOperators" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorOperators</span></a> <a href="https://digitalcourage.social/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://digitalcourage.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://digitalcourage.social/tags/obfs4proxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4proxy</span></a> <a href="https://digitalcourage.social/tags/pluggabletransports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pluggabletransports</span></a></p>
Kevin Karhan :verified:<p>So please <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> allow people - if you don't want to change the UI for <a href="https://bridges.torproject.org" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bridges.torproject.org</span><span class="invisible"></span></a> - to at least craft requests that allow users to select <a href="https://mstdn.social/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> and/or <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://mstdn.social/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a> as well as <a href="https://mstdn.social/tags/Transports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Transports</span></a> [regardless inf <a href="https://mstdn.social/tags/vanilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vanilla</span></a>, <a href="https://mstdn.social/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://mstdn.social/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a>, <a href="https://mstdn.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> or <a href="https://mstdn.social/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a>] and <a href="https://mstdn.social/tags/ports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ports</span></a> [i.e. 443 &amp; 80] are often the only known working ones!</p>
Kevin Karhan :verified:<p>It's not as if I don't know ~why~ <span class="h-card"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> chose to be that restrictive but it's quite sad that one's kinda barred from honestly contributing to the project.</p><p>I could understand and accept any decision if they at least told me why they'd not want me or have not replied to it.<br> <br> <br>Another issue is that for some absurd reason one can only add a single <a href="https://mstdn.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> <span class="h-card"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> <a href="https://mstdn.social/tags/bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridge</span></a> when ine wants to configure a hidden connection.</p><p>This is kinda stupid since <a href="https://mstdn.social/tags/meek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meek</span></a>, <a href="https://mstdn.social/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> and <a href="https://mstdn.social/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> also exist.</p>
Geeky Malcölm 🇨🇦🍀🇺🇦<p><span class="h-card"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> <a href="https://ioc.exchange/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a> bridge is officially online...Thanks again to @jzsavoie and <span class="h-card"><a href="https://infosec.exchange/@Toxic_Flange" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Toxic_Flange</span></a></span> in this project...</p>
Christian Saris<p>"Wie kann man eigentlich den Leuten in Iran technisch helfen, um die staatliche Zensur zu umgehen?" wurde ich in letzter Zeit immer wieder gefragt.</p><p>Dieser Artikel aus der aktuellen ct Beschreibt die erfolgreiche Zensurstrategie der Iranischen Regierung.</p><p>Er versucht aber auch der Frage nachzugehen, was man machen kann. <a href="https://gruene.social/tags/zensur" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zensur</span></a> <a href="https://gruene.social/tags/iranrevolution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iranrevolution</span></a> <a href="https://gruene.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a> <a href="https://gruene.social/tags/snowflake" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snowflake</span></a> <a href="https://gruene.social/tags/iran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iran</span></a> <a href="https://gruene.social/tags/signalproxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>signalproxy</span></a> <a href="https://gruene.social/tags/obfs4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfs4</span></a></p><p><a href="https://www.heise.de/select/ct/2023/2/2232513434673096183" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/select/ct/2023/2/2232</span><span class="invisible">513434673096183</span></a></p>