[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Blocking child pornography exits

On Sun, 2007-22-07 at 13:57 -0700, Michael_google gmail_Gersten wrote:
> > Short version: If I knew how to build a version of Tor that could be
> > used only for Good and never for Evil, I surely would.  But I have no
> > idea how to do that well, and I don't think anybody else does either.
> > (There are proposed solutions to do that.  They are bad.)
> Ahh. When you put it that way, there is a simple solution. Remember, the
> IP specs define a "malicious" bit that all bad, evil data packets will set if
> they are standard compliant.
> So, as long as these evil users comply with the standards, Tor can filter
> them out. All done :-).

Sadly Evil (users/persons/companies/etc) almost never self identify as
such. And so, would fail to set the bit because in their view it doesn't
apply. Leaving us with a situation in which only people with a
conscious, and a guilty one at that, would set the bit. It has been my
experience that most people that fall into the "would set the bit"
category are not the ones people need to worry about, but rather persons
being far to hard on themselves for human failings. so unfortunatley
filtering on the evil bit probably wouldn't help much.

as a side note I've always thought it would be neat to packet sniff and
see if anyone is actually setting this bit. But I'm routered and thus
most of the interesting stuff never makes it to my machine.. I could
always DMZ myself I suppose but seems like a lot of work for such
trivial curiosity.

Have a pleasant day all

Freemor <freemor@xxxxxxxx>
Freemor <freemor@xxxxxxxxxx>

This e-mail has been digitally signed with GnuPG

See: http://gnupg.org/ for more details

Attachment: signature.asc
Description: This is a digitally signed message part