On Thu, May 12, 2016 at 12:19:29AM -0400, Roger Dingledine wrote: > Do we know anything about how they decided to detect obfs4 (and what > collateral damage they decided was acceptable there)?
No, we didn't find out how they were blocking obfs4. Justin suspects it's not an IP blacklist because neither the default Tor Browser bridges nor custom bridges worked. He tried setting iat-mode=1 (activating packet timing obfuscation) on the client, and obfs4 was still detected. We didn't have an iat-mode=1 server to test timing obfuscation in both directions. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk