On Sat, 2012-02-11 at 14:50 +0000, Daniel Case wrote:
> Hey Guys,
>
> As you may have heard, over the last few weeks the Iranian government
> have come hard against all SSL/TLS encrypted traffic and stopped most
> of it getting through. I'm going to set this up on my server:
> https://lists.torproject.org/pipermail/tor-talk/2012-February/023070.html
>
> I was just wondering if there is any reason it would be violating any
> Bitfolk policies and any best practise tips you can give me to
> minimize any impact.
>
> Thank you,
> Daniel
>
The link you gave doesn't go into any technical detail. What does this
do that a normal tor relay/bridge doesn't? Specifically, what sort of
things will it do that *might* bring you into violation of Bitfolk T&C?
M
From danielcase10@??? Sat Feb 11 15:39:51 2012
Received: from mail-lpp01m010-f48.google.com ([209.85.215.48])
by mail.bitfolk.com with esmtps (TLS1.0:RSA_ARCFOUR_SHA1:16)
(Exim 4.72) (envelope-from <danielcase10@???>)
id 1RwF3H-0002k1-3e
for users@???; Sat, 11 Feb 2012 15:39:51 +0000
Received: by lagw12 with SMTP id w12so4508535lag.21
for <users@???>; Sat, 11 Feb 2012 07:39:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma;
h=mime-version:in-reply-to:references:from:date:message-id:subject:to
:cc:content-type;
bh=jMW0qs1dtCXrYy257Uuf7kK7zBboJPy0jeWey0kpDbY=;
b=GFW6aEyf2tSzFwIQXx+ACbvy6jazWQQ3WS41aJP54vqcDzIELKX1jnnHIzReZPlLaX
iOX7lMUfD6nTxzyS7JsAJut9eLJamLwvV26F+C4c11RqHk0CqOaZf8RSTAZVOc6S5Ytt
geG+0Er3A4XYr7mjwhn3aceebjpJYEl10lsTQ=
Received: by 10.112.102.129 with SMTP id fo1mr3563930lbb.0.1328974785112; Sat,
11 Feb 2012 07:39:45 -0800 (PST)
MIME-Version: 1.0
Received: by 10.152.112.232 with HTTP; Sat, 11 Feb 2012 07:39:25 -0800 (PST)
In-Reply-To: <20120211152619.GF23380@???>
References: <CALdaYd06o3HAm_p+C7Qn87FJJbBftEiEm1FMBs_dDf4PkNF5yA@???>
<20120211152619.GF23380@???>
From: Daniel Case <danielcase10@???