eliminating bogus port 43 exits

Jon scream at nonvocalscream.com
Sat Jun 13 22:29:39 UTC 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Tor Fox wrote:
> Jon wrote:
> > You've lost the context.
>
> I don't know, maybe I have. It seemed that you were pleading with us
> not to ruin Tor by peeking at exit traffic and I was just explaining
> that Tor exit nodes can be operated by anyone, even less than
> scrupulous individuals. So, we're probably the last people that Tor
> users need to be worried about. If that's not what you were doing
> then I have no idea. You've only told me I'm wrong but have
> refrained from explaining why or giving any helpful clues at all.
There was no pleading.  There is no ruining of Tor.  That is hyperbole.


I got it that operators will snoop.  But if you can't read the
documentation, and get the grok the gist of the idea behind Tor...

You want me to provide hard facts?  It does not take a whitepaper to
inform me that peering at traffic leaving the border is "A Good Thing" TM.

Jon
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAko0KE8ACgkQR7/9CWL6/5jhCQCgrDSNI0qKi2txbmB7Q5JhDfb7
Ql0Ani5lBrbKSd02lQY0B1I/Z+BikudI
=LLxG
-----END PGP SIGNATURE-----



More information about the tor-talk mailing list