Nowadays, traditional wall-piercing techniques are not good at all. TOR, Gladder, and VPN are all ineffective. Even if I had a self-built glype, I had to take a rest. After reading GFW, it is still a little awesome, but there will always be a wall ladder. The posts of the following two talents provide a new method for the extraordinary period, it's a pity how to configure the Tor Bridge in Ubuntu with a wall. It's all written on the executor's blogspot, And the tumble ladder is in the middle. Isn't it a matter of worry? It was hard to see the wall-mounted secret. The following describes how
Nowadays, traditional wall-piercing techniques are not good at all. TOR, Gladder, and VPN are all ineffective. Even if I had a self-built glype, I had to take a rest.
After reading GFW, it is still awesome, but there will always be a wall ladder. the posts of the two talents below provide a new method.
How to use "Build" to penetrate the wall in extraordinary periods
How to configure the Tor Bridge in Ubuntu
Unfortunately, they are all written on shard's blogspot, And the tumble ladder is in the middle. Isn't it a hurry?
It was hard to see the wall-mounted secret.
The following describes how to configure TOR bridges in Ubuntu.
Step 1: Get the bridge address
Use your gmail account to send "get bridges" emails with the subject and content to your bridges@torproject.org
Step 2: configure the Tor Bridge
First, back up the original Tor configuration file torrc to the backup directory:
Sudo cp-p/etc/tor/torrc your-backup-directory and then add the "UseBridges 1" Switch option at the end of the torrc configuration file (0 by default, that is, off ),
UseBridges 1
Note: In the HOLY JOE'S BLOG, this field is written as "UserBridges 1". After testing, this field is written as "User"
Finally, append the bridge list in the bridges@torproject.org reply mail to the end of the torrc configuration file, and add it in the original format of bridge in the reply mail, that is:
Bridge ip: port fingerprint
The emails mentioned in the above two blogs contain the fingerprint field, which is not found in the emails I received. However, they are also valid after testing.
Step 3: restart Tor and Privoxy
Sudo/etc/init. d/tor restart
Sudo/etc/init. d/privoxy restart