I have been testing with meek transport bundle 3.6.2.
I simply observed outbound connections with wireshark, and it was nearly always google's IP. But occasionally, it reaches out to a Tor node. In my case, it took 66 bytes from 5.135.59.74 which is a Tor node (checked with ExoneraTOR)
I think this will let the traffic observer know you are connecting to tor network.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Perhaps you can keep a debug-level Tor log (add "log debug file /path/to/debug-file" to your bundle's torrc file) and then look into it more when it happens?
I found that fingerprint by searching 5.135.59.74 in Atlas. If you have such a line, it helps confirm that it is the bundle tor making the connections.
As arma says, it will be great if you can get a debug log from around the time of the connection.
It was not in the EntryGuard list, there wasn't any. I don't have debug log from that time, but I was unable to reproduce it afterwards. But I didn't have system-tor or any other tor process active & running.
Late comment because I couldn't login this common account as it had its password changed for some reason.
It was not in the EntryGuard list, there wasn't any. I don't have debug log from that time, but I was unable to reproduce it afterwards. But I didn't have system-tor or any other tor process active & running.