Tor blocking german nodes
Marco A. Calamari
marcoc1 at dada.it
Sat Nov 24 16:51:11 UTC 2007
On Sat, 2007-11-24 at 14:58 +0100, kazaam wrote:
> >
> > 1) mout are born in few weeks
> > 2) all of them are exit router, no other
> > country has more than 50%
>
> What wanna Chinese do if they just have exit-routers?
> Phishing unsecured logins or trying to fake ssl certificates?
> Just with exit-routers you can't compromise the anonymity of
> the tor network. If the user doesn't act stupid...
The right question is "What the Chinese government
or TLA's can do controlling at leat the 25%
of network?"
For example, CN has comlete control over 1/64 of
Tor network traffic, or abour 2%.
I understand that Tor has a lot of crypto in place
to defend against rogue nodes, also when they are acting
cooperatively.
I understand also that too much configurable
options in Tor can be problematic, from
a programming, a debugging, and a partitioning
attack point of view.
But I Would be very happy to have a
fuckNodeByCountryCode= in the
config file. Guess my favorite value ...
Ciao. Marco
--
+--------------- http://www.winstonsmith.info ---------------+
| il Progetto Winston Smith: scolleghiamo il Grande Fratello |
| the Winston Smith Project: unplug the Big Brother |
| Marco A. Calamari marcoc at marcoc.it http://www.marcoc.it |
| DSS/DH: 8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B |
+ PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 ----------+
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 307 bytes
Desc: This is a digitally signed message part
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20071124/a898f2f9/attachment.pgp>
More information about the tor-talk
mailing list