Quote from: QTC on April 13, 2012, 09:27 pmThis is really cool but I can't see where it's undergone extensive review. So I would continue to use the Tor Project's protocol obfuscator which is being actively maintained and took no small amount of effort to review and push out.Thanks for the post QTC. I've just had a peek at ObfuscaTOR and it seems that this is a way of disguising the identity of Tor Bridges. Forgive my ignorance but surely it would still be possible to detect someone was using a Torified connection if they did this? It just wouldn't be possible to block them from accessing Tor bridges?V.