On the article
https://scenes.noblogs.org/post/2023/09/21/circumventing-tor-censorship/
there is a huge mistake.
Tor Bridges are meant to make it harder for one’s ISP to find out we are
using Tor. But that’s it and only it. That’s from *our* ISP point of
view, nothing to do with the websites we visit.
Tor Bridges are basically “Tor non-public entry nodes”, meaning you get
a specific Entry relay to the Tor network. But the rest of the circuit
just works as usual and exit nodes are exit nodes.
Websites see the *exit node* we come from. And there is no easy way to
prevent the website admins to see it’s a Tor exit node (and block us).
I see only one reliable way: use a VPN *inside* Tor. But this technique
is particularly difficult to setup and pretty dangerous.
But for thoses with the skills, it’s possible to open a tunnel through
tor (`torsocks ssh -D1312 `) and use Mullvad Browser to
browse through it. But again, not highly reliable and you need a machine
to connect to and that’s not linked to your identity (as the websites
will see this machine’s IP address)
Also, Tor is spelled Tor, not TOR (never!).
I wish you the best for your struggles,
Cheers from an anarchist from the other side of the world :p
Submitted Anonymously Over Email