reconsidering default exit policy
Chris Palmer
chris at eff.org
Mon Aug 29 16:34:20 UTC 2005
Richard Johnson writes:
> But the controllers of those bots often will try to use tor.
Do you have any evidence for this? I have assumed it was possible and
that some people might do it, but have you actually seen it happen?
> You may feel that IRC is one of those protocols that, like SMTP and
> NNTP, is aggressively unauthenticated and prone to abuse.
Authenticated protocols are prone to abuse, too. ;) Often the
authentication mechanism itself is the abused component.
--
http://www.eff.org/about/staff/#chris_palmer
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050829/f0bb234c/attachment.pgp>
More information about the tor-talk
mailing list