Building tracking system to nab Tor pedophiles
Mike Perry
mikepery at fscked.org
Wed Mar 7 06:18:41 UTC 2007
Thus spake Fergie (fergdawg at netzero.net):
> Hmmm.
>
> http://blogs.zdnet.com/security/?p=114
>
> Comments?
Will they write a ZDnet article about me when my node scanner starts
to delist his compromised exit nodes? ;)
There's of course no way that these nodes can be allowed to continue
to be exits if discovered. Any of them can be retooled into targeting
a lot more than just pedophiles, for fun, profit, or via subpoena.
He's also putting himself in an interesting position here wrt federal
wiretap law as well (as mentioned on the Tor legal faq). Though of
course, he picked a good target to pick on. The anonymous typically
have little legal recourse. Especially when you claim they all just
want child porn.
Of course, anyone utilizing common Tor best practices will not be
affected by this. (Though the one gripe I have is that NoScript allows
Java if you allow scripts.. But there are also extensions that block
Java globally - like QuickJava).
At any rate, I welcome a good open source implementation of this. If
nothing else, it will be nice to pit it against my scanner on a test
network to make sure this sort of thing can be reliably detected.
As an aside, it's recently become clear that a lot of people are using
these Internets things to transmit child pornography. Perhaps we
should just shut 'er down?
Sure would be easier than actually finding the PRODUCERS of such
content...
--
Mike Perry
Mad Computer Scientist
fscked.org evil labs
More information about the tor-talk
mailing list