North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Tor and network security/administration

  • From: Chris Kuethe
  • Date: Sat Jun 17 10:26:09 2006
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta;; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=CHgKTL0Fg/FbIunaStit58Uw6Idw5q82N1r2NkZNLB/YPts1TSUp3JhZ6X2+RyKik97FSA+bjFFNIbZeEHWAs4hV5f/IXhw0kaZrX9KGEP0Z/c2W0KBBoe+8olHGcygtoXxOD9GAJ3rB3BGN9VvCI9tQdHSiOhC07DaAVL1a8xU=

On 6/17/06, Jeremy Chadwick <[email protected]> wrote:
The problem I see is that this technology will be used (literally,
not ideally) solely for harassment (especially via IRC).  I do not
see any other practical use for this technology other than that.
The whole "right to privacy/anonymity" argument is legitimate, but I
do not see people using* Tor for legitimate purposes.
My legitimate use of Tor is because I object to companies following me
around on the net. Yes, I block ads and reject cookies, too. I choose
to not disclose my browsing to others. I get enough random commercial
crap foisted upon me that I have no time or patience for the targetted
commercial crap. To paraphrase Zimmerman's philosophy of PGP - you may
be having a hot affair, or you may be doing something politically
sensitive, but it's nobody's business but yours.

As for an attempt at a technical control, maybe set up a box with Tor
on it, get a list of exit servers and null-route them automagically.


GDB has a 'break' feature; why doesn't it have 'fix' too?