[talk] upcoming hackathon proposal: NYC BSD Tor bridges

George Rosamond george at ceetonetechnology.com
Tue Aug 8 13:42:00 EDT 2017

Espen Tagestad:
> On Aug 8, 2017, at 12:31 PM, Brian Cully <bcully at gmail.com> wrote:
>>> On 8-Aug-2017, at 11:28, George Rosamond
>>> <george at ceetonetechnology.com> wrote: I want to put this workshop
>>> together to conduct a hands-on session that will put another five
>>> or ten *BSD bridges into the Tor ecosystem. You don't need to go
>>> an buy some fat 2U Supermicro box that will make ConEd happy and
>>> give you the constant droning of a data center. Any small system
>>> should be fine, whether you have it sitting around or you buy an 
>>> APU2, Soekris, RPi, BeagleBone, an old thin client desktop.
>> I’d be up for this. I’ve got a FreeBSD box at home for my NAS
>> that’s been pretty over-provisioned and basically idle.
> Second that! I also have a couple of boxes around which could
> potentially be used to host a jail or two for this. I have some
> concerns running an exit node, though.

No need to run an exit node.. which would be a bad idea at home anyways.

Bridges are non-public entries into the Tor network, with the IPs
carefully distributed to users who request them.

They are basically hidden nodes for users blocked from the public Tor


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.nycbug.org/pipermail/talk/attachments/20170808/9760913a/attachment.bin>

More information about the talk mailing list