[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] unflagged BAD EXIT nodes



At 10:04 7/4/2015 +0200, nusenu wrote:
>I find it more worrying that we do not "hear"
>about the 'more serious attacks' that keep
>them busy and don't allow them to look into 
>i.e. 'AviatoChortler' (even after a few
>weeks). That might mean that there is a
>constant stream of 'more serious attacks'
>(without information I can only guess).

Here is one where 70 bad exits were
rewriting an .onion address on a
clearnet portal and sending a Tor
email service's users to an evil
onion clone:

https://lists.torproject.org/pipermail/tor-talk/2015-April/037549.html

I can see the argument for ignoring
the near-zero-ranked exits (as they
will virtually never be used) and
the massive BW password stealer
(due to the value of the bandwidth
and the fact that HTTPS is immune
to passive sniffing).

But am concerned Chloe apparently
received mute indifference as her
contribution to the project is
significant.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays