Re: [tor-talk] Revisiting youtube blocking TBB, virtually all 1st attempts to load YT

2020-03-09 Thread nusenu
Mirimir: > On 03/08/2020 02:40 PM, nusenu wrote: >>> What would stop a bad actor from creating a bunch of new circuits and >>> making all Tor IPs look bad if they were so inclined? >> >> yes there are distribution strategies that can prevent that >> or make that very expensive (an /48 IPv6 block

Re: [tor-talk] Mozilla's DNS over HTTPS does not complement Tor

2020-03-09 Thread Ben Tasker
Several places, but the main user/admin facing doc is probably this one - https://support.mozilla.org/en-US/kb/configuring-networks-disable-dns-over-https > Networks can signal to Firefox that there are special features such as these in place that would be disabled if DoH were used for domain name

Re: [tor-talk] Mozilla's DNS over HTTPS does not complement Tor

2020-03-09 Thread Nathaniel Suchy
Where is this documented? Cordially, Nathaniel Suchy (they/them) Sent from ProtonMail Mobile On Sun, Mar 8, 2020 at 5:21 PM, Ben Tasker wrote: > The canary domain will only disable DoH if you've been defaulted into using > DoH. > > If you've actively turned it on, or set network.trr.mode to 3

Re: [tor-talk] Revisiting youtube blocking TBB, virtually all 1st attempts to load YT

2020-03-09 Thread Nathaniel Suchy
Or just block datacenter addresses /16s entirely and only allow whitelisted home/business ISPs. Google has the technical staff to make such a draconian approach possible. Cordially, Nathaniel Suchy (they/them) Sent from ProtonMail Mobile On Sun, Mar 8, 2020 at 7:22 PM, Mirimir wrote: > On 03