[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Hacker strikes through student's router



How hard would it be to run a Tor exit node which accepts GET requests but not POST requests?  Or, possibly, POST requests could simply be passed on to another Tor exit node?  Would it be ethical to do this?  You'd have to examine the traffic to see if it was a GET or a POST, but you wouldn't have to store anything.