[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Building tracking system to nab Tor pedophiles
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Building tracking system to nab Tor pedophiles
- From: coderman <coderman@xxxxxxxxx>
- Date: Wed, 7 Mar 2007 02:41:54 -0800
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivery-date: Wed, 07 Mar 2007 05:42:06 -0500
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=esHis7vyO/t5RtkvRGpgQ/e5klCZICIhtw2Mhdroc/2faU2nYOy5LiNxXoVWgzYb41fjbudKO7pJSt0J1cmF9oJpg+CBM0ikDvM8vOZwupn/uY0lpDLU+P1fN5nm0M5uz4LbFjuKOu29S/3hJZy2rlhGjVqkekeyfojIgXY/yRo=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=CejrR+LT3FelkZFW3J7gDI79bIRaRqTJ37vCVLjl1y9Rx3azLhZwhn1vws8Ut+v4CkoWB+Qj49RF+2mvTTS5hEjW4tu7CGvDJZHIX+78w5CqEFvxQw2bLlw4uOV+XjwQ0N0TiYCFGbFAop44988XX7O9SxmRkkkFAm1sBmYB4oo=
- In-reply-to: <20070307064227.GN28282@moria.seul.org>
- References: <firstname.lastname@example.org> <45EE5406.email@example.com> <20070307064227.GN28282@moria.seul.org>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On 3/6/07, Roger Dingledine <arma@xxxxxxx> wrote:
So the moral of the story appears to be turn the plugins off, period.
The broader moral is: don't run code from strangers on your computer. The
even broader moral would be to lament that we're still not using SSL on
most Internet interactions.
the depths of just how badly security in general sucks well captured.
at least some areas of the technology landscape are showing signs of
improvement. bitfrost and mac(with parrallels?).
otherwise, the capriciousness of users encouraged by the inherent
architectural vulnerabilities sold in mass quantity by vendors more
concerned with profit and appearance than customer vulnerabilities
ensures lots of targets...
i need a drink... *g*
And maybe the fourth is that we (somebody
here) should work on easy instructions for locking down common OS network
interfaces so only Tor communications can get through. Or Tor LiveCDs
that have that already done. Or VM images that can be run as routers
between your computer and the Internet.
ah, at least this can be worked on in a straightforward fashion.
(unlike transnational market forces with lots of momentum :)
and even various combinations of the above for additional
compartmentalization without excessive overhead. some relevant links:
(btw: if anyone has some bandwidth they would like to donate for
janusvm dev torrents please email me so i can contact you for early