[tor-relays] exit node experience: abuse over HTTP, stealrat infection
Thomas White
thomaswhite at riseup.net
Sun Oct 19 23:19:40 UTC 2014
Already working on it (see
https://trac.torproject.org/projects/tor/ticket/13421)
Will involve a lot of outreach and will need to consider lots of
jurisdictions but it can be done with a few volunteers over the next few
weeks I feel. I may also be proposing on trac a @torproject.org email
for such things so if ISPs did want to do a little fact checking they
can have an easy point of contact and also allows a central place to
reach out to the ISPs.
I feel a central email for such things would garner more respect than
the fracture groups assigned using their own personal emails.
-T
On 19/10/2014 23:21, I wrote:
> Thomas,
>
> That sounded so reasonable and persuasive that would it be a good idea to have a formal opinion written to give to server companies early on?
>
> They might still be looking at the time it takes to deal with notices or police queries but they must accept that the risks of allowing Tor are miniscule.
> Perhaps the way around the remaining deterrence is a Tor response 'centre' for them to painlessly redirect irritations to.
>
> Robert
>
>
>>
>> Yes there are safe harbour provisions.
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
More information about the tor-relays
mailing list