My #Tor setup consists on a single #obfs4 Relay Bridge and two #Snowflake proxy servers. All running minimized installs of #Ubuntu. They are all running on #Wyse terminals to boot!
We don't expect these bridges to be particularly good at evading #government#censorship since they are in the same IPv4 /24 subnet as our exit relays. Countries like China and Russia undoubtably already block our subnet. However, we think they are a trustworthy (and fast) guard node when configured.
If you'd like to try one of our bridges, we have published them here:
Emerald Onion is thankful for less #censorship on the internet.
We've been working on a new bridge management shell script, which aims to make it easier for #tor bridge operators to deploy and manage #obfs4 bridges on #Debian and #Ubuntu systems.
Definitely gonna set up #Tor, #I2P and #Veilid nodes once I got access to a gigabit connection as well as a #TorSnowflake node routed through dynamic IP endpoints. #Freifunk should also be a thing then. Perhaps a #Signal relay...
It's not as if I don't know why@tails chose to be that restrictive but it's quite sad that one's kinda barred from honestly contributing to the project.
I could understand and accept any decision if they at least told me why they'd not want me or have not replied to it.
Another issue is that for some absurd reason one can only add a single #obfs4@torproject#bridge when ine wants to configure a hidden connection.