<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Jan 22, 2018 at 10:50 AM, teor <span dir="ltr"><<a href="mailto:teor2345@gmail.com" target="_blank">teor2345@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><br><div>On 22 Jan 2018, at 18:17, C. L. Martinez <<a href="mailto:carlopmart@gmail.com" target="_blank">carlopmart@gmail.com</a>> wrote:<br></div><blockquote type="cite"><div dir="ltr"><div class="gmail_extra"><br><div class="gmail_quote">On Sun, Jan 21, 2018 at 3:57 PM, teor <span dir="ltr"><<a href="mailto:teor2345@gmail.com" target="_blank">teor2345@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
> On 21 Jan 2018, at 23:29, C. L. Martinez <<a href="mailto:carlopmart@gmail.com" target="_blank">carlopmart@gmail.com</a>> wrote:<br>
><br>
> Hi all,<br>
><br>
> Is it possible to configure Tor daemon as a bridge and as a client at the same time? For example:<br>
><br>
> SocksPort 0<br>
> ORPort 9001<br>
> BridgeRelay 1<br>
> ExitPolicy reject *:*<br>
> Log notice file /tmp/tor_notices.log<br>
> VirtualAddrNetwork <a href="http://10.192.0.0/10" rel="noreferrer" target="_blank">10.192.0.0/10</a><br>
> TransPort 9040<br>
> DNSPort 1053<br>
> AutomapHostsOnResolve 1<br>
> AutomapHostsSuffixes .exit,.onion<br>
><br>
> On the other side, is it possible to choose exit nodes by nickname instead by country?<br>
<br>
It is possible to do all sorts of things with Tor.<br>
<br>
But running a bridge and a client together lowers your anonymity,<br>
and possibly the anonymity of the bridge users.<br>
(For example, your IP address will be given out to bridge users.)<br>
<br>
And choosing exit nodes makes it easier to link your exit nodes<br>
and your entry nodes, and discover your client.<br>
<br>
Why do you want to do these things?<br><span class="m_-3350338493164366859HOEnZb"><font color="#888888"><br></font></span></blockquote></div></div><div class="gmail_extra">Thanks Teor. I would like to run a tor bridge but at the same access, I would like to access from my laptop to Tor using this bridge without using TBB or third party components ... Is this possible?</div></div></blockquote><br><div>All sorts of Tor configurations are possible.</div><div>But TBB exists for a reason.</div><div>Some Tor configurations don't get you very good security or anonymity.</div><div><br></div><div>What do you need Tor to do for you?</div><div><br></div><div>For example:</div><div><br></div><div>If you want to send all your traffic via Tor so you can evade censorship,</div><div>your current TransPort configuration can send all your traffic through</div><div>Tor to an exit.</div><div><br></div><div><span style="background-color:rgba(255,255,255,0)">But, if you use the SOCKSPort or TransPort on your bridge, then your</span></div><div><span style="background-color:rgba(255,255,255,0)">circuits </span><span style="background-color:rgba(255,255,255,0)">will </span><span style="background-color:rgba(255,255,255,0)">look different to the circuits made by the other clients using</span></div><div><span style="background-color:rgba(255,255,255,0)">your </span><span style="background-color:rgba(255,255,255,0)">bridge. </span><span style="background-color:rgba(255,255,255,0)">(They won't use your bridge as a guard, and they will appear</span></div><div><span style="background-color:rgba(255,255,255,0)">to </span><span style="background-color:rgba(255,255,255,0)">have one more hop</span><span style="background-color:rgba(255,255,255,0)">.)</span></div><div><span style="background-color:rgba(255,255,255,0)"><br></span></div><div>If you want to be anonymous and blend into the other traffic for your bridge,</div><div>then set up one or more Tor clients with SOCKSPorts or TransPorts, and</div><div>configure them to use your bridge.</div><div><br></div><div>But this won't stop apps leaking data. Apps can share your local IP address</div><div><span style="background-color:rgba(255,255,255,0)">(BitTorrent), or tell websites where you've been (browsers). If you care about</span></div><div><span style="background-color:rgba(255,255,255,0)">data leaks like this, choose apps that protect you, like Tor Browser or</span></div><div><span style="background-color:rgba(255,255,255,0)">Tor Messenger.</span></div><span class="HOEnZb"><font color="#888888"><div><span style="background-color:rgba(255,255,255,0)"><br></span></div><div><span style="background-color:rgba(255,255,255,0)">T</span></div><div><br></div><div><br></div></font></span></div></blockquote></div></div><div class="gmail_extra">Ah ... Ok. Understood. Pretty clear now Teor. Many thanks for your help another time.</div><div class="gmail_extra"><br></div><div class="gmail_extra">And th second question: is it possible to filter by Nicknames instead of country in torrc's exitnodes section? Or is it a stupid question?</div><div class="gmail_extra"><br></div></div>