[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata



Then what _can_ we do? Because as it stands, Tor is the perfect tool for criminals, and your stand is "do nothing." An ISP can trace illegal activity to a user, we can't. Even if Tor is considered an ISP in that sense, the rules vary by country, maybe even by provider.

I'm being to think there is no real solution to the problem. As long as Tor serves its purpose of providing uncensored access to the Internet, bad guys will always abuse it, and the operators will almost always be at odds with their ISP. Anything we try to do to block abuse will destroy the very concept of Tor.


On Oct 5, 2016 4:51 PM, "Green Dream" <greendream848@xxxxxxxxx> wrote:
@Markus

Okay, so you are offended by the phrase "it's that simple". Sorry, if
I could remove that sentence I would. I didn't mean to imply that
running an exit was trivial or easy.

Otherwise, I stand by my argument -- automated filtering or blocking
is not the right answer. The co-founder of Tor already said as much in
this thread: "it would seem that using an IPS is fundamentally
dangerous for relay operators".
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays