Mirimir:
> On 03/08/2020 02:40 PM, nusenu wrote:
>>> What would stop a bad actor from creating a bunch of new circuits and
>>> making all Tor IPs look bad if they were so inclined?
>>
>> yes there are distribution strategies that can prevent that
>> or make that very expensive (an /48 IPv6 block
Several places, but the main user/admin facing doc is probably this one -
https://support.mozilla.org/en-US/kb/configuring-networks-disable-dns-over-https
> Networks can signal to Firefox that there are special features such as
these in place that would be disabled if DoH were used for domain name
Where is this documented?
Cordially,
Nathaniel Suchy (they/them)
Sent from ProtonMail Mobile
On Sun, Mar 8, 2020 at 5:21 PM, Ben Tasker wrote:
> The canary domain will only disable DoH if you've been defaulted into using
> DoH.
>
> If you've actively turned it on, or set network.trr.mode to 3
Or just block datacenter addresses /16s entirely and only allow whitelisted
home/business ISPs. Google has the technical staff to make such a draconian
approach possible.
Cordially,
Nathaniel Suchy (they/them)
Sent from ProtonMail Mobile
On Sun, Mar 8, 2020 at 7:22 PM, Mirimir wrote:
> On 03