[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor Defense Fund...an idea.
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Tor Defense Fund...an idea.
- From: Anothony Georgeo <anogeorgeo@xxxxxxxxx>
- Date: Mon, 11 Sep 2006 08:35:30 -0700 (PDT)
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivery-date: Mon, 11 Sep 2006 11:35:38 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=Yu88HEJCpbQMy53sKRNsMxVoClBcXwzzJ527GLFFNxBSlHr0g+fZhRTAWXDUa1sXd+wm4qwC6gCKMks6k1G9yW3Ihv6UVVRDSHIdyah8e/GXK1mnv+t1AWRf1ZhemnhafOdBgmPy8mJhdVaPkpCGIor4VJf1NgPLq4Mhc30nBqU= ;
- In-reply-to: <email@example.com>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Michael Holstein <michael.holstein@xxxxxxxxxxx> wrote:
> I agree that being behind someone else's firewall is a problem as theIMO making all Tor clients also function as MiddleMan Nodes, RPs, etc (all *except* Entry and Exit nodes) would be a good move. It might be good to also make Tor clients function as Entry nodes (not Entry Guards) to increase their usefulness.
> user may not understand the implications of this and thus advertise an
> impossible exit policy.
Suggestion for the coders .. make the client test itself and adjust the
exit policy on the fly.
Just a few quick thoughts:
A default bandwith rate on the low to minimum side would be a good. It may also be good to make two instances of Tor start when an end-user starts Tor. One instance would be the client
and the other would be the server (w/ "SocksPort 0").
How low will we go? Check out Yahoo! Messenger?s low PC-to-Phone call rates.