[TheRecord] Tor Project sees decline in server numbers, will offer rewards for new bridge operators

The Tor Project said this week that it has seen a drop in the number of Tor relays and bridge servers and is now offering various rewards to users who help bring the number back up.

Rewards include the likes of hoodies, t-shirts, and stickers and are meant to provide some sort of meaningful gift to those who help keep the Tor anonymity network alive and resilient to censorship.

More specifically, the rewards will be provided to those who run Tor “bridges,” which serve as entry points into the Tor network for users located in countries that block access to Tor servers.

“We currently have approximately 1,200 bridges, 900 of which support the obfs4 obfuscation protocol,” said Gustavo Gus, Community Team Lead for the Tor Project.

“Unfortunately, these numbers have been decreasing since the beginning of this year. It’s not enough to have many bridges: eventually, all of them could find themselves in block lists. We therefore need a constant trickle of new bridges that aren’t blocked anywhere yet,” the Tor Project member said.

Image: Tor Project

Tor Project needs 200 Tor bridge relays by the end of the year

“This is where we need your help. The goal of this campaign is to bring more than 200 obfs4 bridges online by the end of this year,” Gus added.

The Tor Project, which has always had difficulties in getting access to vast monetary resources, would be providing some sort of rewards for those who decide to help the project with its effort to keep the Tor network running and resilient to censorship.

Golden Gate bridge (limited to 10 kits)

Run 10 obfs4 bridges for 1 year.Reward kit: 1 Tor hoodie + 2 Tor T-shirt + stickers pack.

Helix bridge (limited to 20 kits)

Run 5 obfs4 bridges for 1 year.Reward kit: 1 Tor T-shirt + stickers pack.

University bridge kit (limited to 10 kits)

Run 2 obfs4 bridges for 1 year in your university.Reward kit: 1 Tor T-shirt + stickers pack.

Rialto bridge (randomly select 10 new bridge operators)

Run 1 obfs4 bridge for 1 year and you will be part of the ‘reward lottery’.We will randomly select 10 new bridge operators to receive a metallic roots Tor t-shirt as a token of our gratitude for your help defending the open internet.

Gus said the promo campaign will run until January 7, 2022.

Technical requirements and other info for those who might be interested in re-activate their Tor bridges or running new ones are available in the Tor Project’s announcement.

The post Tor Project sees decline in server numbers, will offer rewards for new bridge operators appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

Daily NCSC-FI news followup 2021-02-19

Apple Offers Its Closest Look Yet at iOS and MacOS Security www.wired.com/story/apple-platform-security-guide-researchers/ In its latest Platform Security Guide, Cupertino raised the curtain on the critical features that protect against hackers. Lisäksi: support.apple.com/guide/security/welcome/web. Lisäksi: www.darkreading.com/endpoint/apple-offers-closer-look-at-its-platform-security-technologies-features/d/d-id/1340198 Mysterious Silver Sparrow Malware Found Nesting on 30K Macs threatpost.com/silver-sparrow-malware-30k-macs/164121/ A second malware that targets Macs with Apple’s in-house M1 chip […]

Read More

[SANS ISC] Multiple BaseXX Obfuscations, (Fri, Jul 16th)

All posts, Sans-ISC

I found an interesting malicious Python script during my daily hunting routine. The script has a VT score of 2/58[1] (SHA256: 6990298edd0d66850578bfd1e1b9d42abfe7a8d1deb828ef0c7017281ee7c5b7). Its purpose is to perform the first stage of the infection. It downloads a shellcode, injects it into memory, and executes it. What’s interesting is the way obfuscation is implemented. Base64 is a common […]

Read More

[BleepingComputer] CISA: Disable Windows Print Spooler on servers not used for printing

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a notification regarding the critical PrintNightmare zero-day vulnerability and advises admins to disable the Windows Print Spooler service on servers not used for printing. […] Source: Read More (BleepingComputer)

Read More