Quote from: wakannabi on June 19, 2012, 07:44 pmQuote from: vlad1m1r on June 19, 2012, 07:38 pmQuote from: zer0cool on June 19, 2012, 07:30 pmGuys, first of all -- The guy who suggested we all use a private silk-road only tor bridge is obviously a fed or intelligence agent. Whoever connects to the Tor Bridge would be exposing their source IP address, as well as exposing themselves to timing attacks if the Tor Bridge is a hostile node. Bad idea.And lastly, anyone that tells you to pool into any single Tor resource (like a "Silk Road" bridge, lol, what a joke) is either an idiot or a federalie...Saying the same thing with a different account isn't going to convince anyone Sweetheart. Who honestly believes that I am with the Police? I've expressed a certain respect for the work they do keeping innocent people safe in the past but there the extent of my sympathies end - as for having a Tor bridge I was simply trying to find some use for a server I will never need - no one has a gun to your head!V.Not trying to say your LE or something like that V, but when offering a private bridge (which could be a good think to my knowledge) you should warn people that you would have access to their IP's right?Surely no more than you would if you set your Vidalia client to run as a bridge? Indeed any fool with access to your ISP's records can know your connection is Torified - apparently the data packets are unmistakeable. What's important is that they're encrypted - I understand it is possible in theory to fingerprint certain hidden services through analysing encrypted packets but will leave that to more gifted forum users to comment on.V.