News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Are TOR bridges really useful? : Tor | Torhoo darknet markets

hello, i was thinking about the tor bridge system. regardless of the system used (obfs4, snowflake, meek), it works by connecting to a server before coming into contact with a public tor node, i know the address of these bridges is not totally public and that protects the user who wants to evade censorship, blocks and hide tor usage, but i thought that someone with time can automate the submission of the ""give me bridges"" form to get an updated list of tor bridges, and thus share it with ISPs to detect tor usage even when there are bridges in between, i know bridges are rotating and updated over time, but what i say can be done constantly and it's not difficult to automatically solve a 5letter captcha

so are tor bridges really useful for hiding tor usage or can an adversary who wants to detect it do so without complications?? what is the alternative?
/u/Obsidia
1 points
3 months ago
Running a private bridge is possible although you should consider your threat model before doing so.

"The second user group is unable to safely start Whonix in the default configuration due to Tor being considered dangerous or suspicious in their locality. In this case private bridges should be utilized instead of public obfuscated bridges, as this makes it harder (not impossible) to detect Tor."
https://www.whonix.org/wiki/Bridges#Hosting_Bridges

If properly configured you get the benefit of not having a listed relay as your guard and assuming the host isn't being malicious, you know the guard isn't trying to run an attack on you. The obvious downside is that only you and people you share the node with are connected to it making it easier to identify you if it ever comes under scrutiny, you must also have the skills to correctly secure and maintain the node yourself.