It’s no problem, I’m asking because I don’t know how Tor works either… At least, not in great detail.
Tor allows you to configure a bridge manually, which they describe in the app as an “unlisted relay”… So in theory, even a malicious set of directory servers could be overridden.
I figure somebody needs to make the call to allow or deny something somewhere, Right? Something needs to be hard-coded somewhere, so that people can download the app and use it without requiring extra knowledge of something in particular. Or at least, I imagine that’s the goal (by the point you are using an unlisted relay, conditions have probably gotten pretty dire).
It’s no problem, I’m asking because I don’t know how Tor works either… At least, not in great detail.
Tor allows you to configure a bridge manually, which they describe in the app as an “unlisted relay”… So in theory, even a malicious set of directory servers could be overridden.
I figure somebody needs to make the call to allow or deny something somewhere, Right? Something needs to be hard-coded somewhere, so that people can download the app and use it without requiring extra knowledge of something in particular. Or at least, I imagine that’s the goal (by the point you are using an unlisted relay, conditions have probably gotten pretty dire).