To view the list of links, please access this site using Tor Browser.
If you’re seeing this message, access is restricted for regular browsers.
Already using Tor? If you are sure you’re currently in Tor Browser, proceed to our .onion version:
Honestly, it is possible to create a better obfuscation protocol than
obfs4, and it's shelf-life expired years ago. No one should be using
it for anything at this point, and no one should have been using it
for anything for the past however many years since I first started
telling people to stop using it.
People should also have listened when I told them repeatedly that there
are massive issues in the protocol.
Do not ask me questions about this.
Do not use it in other projects.
Do not use it in anything new.
Use a prime order group instead of this nonsense especially if you
are doing something new.
All I want is to be left alone.
Please note that it has been assessed as difficult beyond practicality to Hide Tor use from the Internet Service Provider with proxies, bridges, VPNs or SSH tunnels.
Once the premise is accepted, that VPN's and SSH's can leak which website one is visiting with a high accuracy, it's not difficult to imagine, that also encrypted Tor traffic hidden by a VPN's or SSH's could be classified. There are no research papers on that topic.
Trying Packet Size and Timing Obfuscation for obfs4
If a provided obfs4 bridge does not work, the user can try enabling packet size and timing obfuscation by changing the iat-mode value in each last line to either 1 or 2. [18]
Standard (ScrambleSuit-style) IAT obfuscation optimizes for bulk transport and will write ~MTU sized frames when possible.
iat-mode=0 (no obfuscation) / Pass-through
iat-mode=1 (split data into fixed-length packets) / Pad to MTU
iat-mode=2 (split data into variable-length packets)
jmwample github io/ptrs/
computerscot github io/tor-obfs4-bridge-iat-mode-2.html
obfs4 is not designed to hide Tor usage
As the maintainer writes back in 2023, obfs4 passed it's shelf-life expired date years back. Yes, can only agree, government censorship has matured a lot since 2014 (first release of obfs4).
What's annoying is the statement "there are massive issues in the protocol", and then no explanation, nothing in the backlog. What the maintainer say is an obfuscation it self. One thing is clear, it's possible to detect the Tor use with modern network analyzers, and that's bad. But if there is other issues, is unclear.
Tails with Tor Browser does not provide alternative obfuscation protocols.
Best option if Tor traffic must be hidden is to use a VPN connection to a country where Tor is allowed. The user must ensure that there are no DNS-leaks or WebRTC-leaks, thus this would also reveal Tor usage.
Also VPN are a huge problem since it's a single point of failure.
To avoid being detected, the VPN traffic needs to be obfuscated, there are a few options like Mullvad DAITA that change network package sizes and adds background noise so DPI/AI fails to recognize handshaking, error handling and other patterns that otherwise can reveal a Tor circuit.
The Houdini trick is how to connect to Internet from the very beginning. You don't want to reveal your identity to the VPN-provider via the IP-address provided by your ISP. You have a few options how to connect from home:
In all the above do not have the device that connects to Internet in your premises, place it at common areas where everyone has access. Further on, use cables from that device so it connects to every apartment and office in one or several properties (old RG-58 would be perfect). This way you will achieve plausible deniability.
[...] which are not actually anonymous, because once they are powered on (SIM or eSIM alike), as long as you have the simcard on you, you're telling the mobile data provider where the simcard is (right at your appartment / house), and it continuously tells that at all times, with very high precision (down to a few meters type of precision). Lookup what Cellular Tower Triangulation is. It's always a goldmine for cops to dig into that data, all they need is someone's phone number to know where that simcard has gone to, ever since it got powered on. ⚠️more details on that⚠️
> Anonymous mobile phone with SIM and via USB-tethering
Same as above. The only anonymity you can have with a SIM card is VERY limited like i explained here (never taking the phone out of the faraday bag while you're at home, and under surveillance outside. Not the kind of upstream internet connection you can use for daily internet stuff for sure.)
> Hook into property network wiring closet
[...] and then all i need (as the adversary) is follow the cable which leads to your apartment, not viable.
> Use an Yagi-antenna and connect to free Internet at nearby
that could potentially work but only if you live in an urban area, you're out of luck if you're living in some small village.
Anonymity from the ISP is a though one (which i haven't solved myself to be clear, so i don't have an answer yet), but from what i brainstormed so far, that's not realisticly possible. (and if there's no anonymity, then deniability is out of the question, obviously). I recommend you read up on those to know more about the topic.
/post/f12b38fc9337bce6ae34
If i get this router and insert a sim card(bought anonymously) and then connect it to a ethernet cable which will connect with my laptop will my connection be untraceable?(about carding)
As you mentioned SIM-cards what about using the SIM-card (or eSIM) in your anonymous notebook directly if the Linux OS does support it?