[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Using Tor at an on-line advocacy org
- To: or-talk@xxxxxxxxxxxxx
- Subject: Using Tor at an on-line advocacy org
- From: Andrew Del Vecchio <firefox-gen@xxxxxxxxxx>
- Date: Mon, 19 Mar 2007 21:28:51 -0700
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivery-date: Tue, 20 Mar 2007 00:30:07 -0400
- Organization: MPAssetProtection.com
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 220.127.116.11 (X11/20070306)
-----BEGIN PGP SIGNED MESSAGE-----
I do IT for a US public policy organization that won't be
mentioned right now. Very basically, we focus on the First Amendment
redress of/ /grievances thing, sort of like how Moveon.org does it.
Anyway, we are testing the possibility of using Tor to help prevent
being blacklisted by Congressional IT bureaucrats. In conjunction with
this, we'd like to encourage participants (at least donor
participants) to help out by running their own Tor exit nodes to
improve the anonymity and bandwidth capability of the network we've
all come to know and love. I'm all for doing this, but the question
is, how do we do this in a proper manner? My fear is that spreading
the word too much will get us in trouble eventually. Worst case
scenario would be that they blocked ALL known tor nodes, but I think
this is highly unlikely given my first hand experience of the poor
quality of government IT.
That said, does anyone have experience with this kind of
situation? If so, what do you suggest?
Frivolous lawsuits. Unlawful government seizures. What's YOUR defense?
Protect your assets, keep what you earn, and generate more income at the
Visit http://www.mpassetprotection.com/ today.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----