Is "gatereloaded" a Bad Exit?
Aplin, Justin M
jmaplin at ufl.edu
Mon Feb 14 19:17:45 UTC 2011
On 2/14/2011 7:48 AM, grarpamp wrote:
[snip]
> If another example is needed, not that one is; Corporate, edu and
> other LAN's sometimes think they can block 'ooo, encryption bad'
> ports so they can watch their user's plaintext URL's with their
> substandard vendor nanny watch tool of the day. All the while their
> staff laughs at them as they happily tunnel whatever they want over
> that (perhaps even the client or exit parts of Tor). Yes, this kind
> of joke exists :)
[/snip]
Although I've been keeping out of this argument for the most part, and
even though I'm leaning towards seeing things Mike's way, I just wanted
to comment that I've actually been in an environment like this several
times, once at my previous university, and once working for a local
government organization. As asinine as such reasoning is on the part of
the network administrator (or the person who signs their checks), I can
see why the *ability* to run strange exit policies could be a good
thing, and should be preserved in the software.
However, I see no reason why providing an anonymous contact email would
be so hard. Certainly if you're going out of your way to avoid [insert
conspiracy of choice] in order to run a node, you have the skills to use
one of the hundreds of free email services out there? I don't think
asking for a tiny bit of responsibility on the part of exit operators is
too much to ask, and I'm amazed that "allow them to continue to function
as middle nodes until they explain why their node appears broken or
malicious" is continually being turned into some kind of human-rights
violation.
~Justin Aplin
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list