[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Whitedust article
http://radio.weblogs.com/0101123/2005/11/19.html#a5791
or
http://googleblog.blogspot.com/2005/11/vint-cerf-speaks-out-on-net-neutrality.html
I don't think that the above letter and subcommittee hearing are
horribly inappropriate things to think about in this discussion. I
only shift the conversation a little bit sideways to point out that
Tor might just be the ultimate form of net neutrality.
Hummm... I am probably not very coherent right now, or making alot of
sense. I will think on this and re post when I have had some sleep.
apologies
-=Matt=-
On 12/12/05, Void Beast <daemonik.dragon@xxxxxxxxx> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Ok, so we should place rules of some kind...
> So who should police these rules and how should they be impemented?
>
> Many people have different configurations so the rules may be different for
> each person.
> So we should perhaps rely on ourselves to impose our own rules? But then,
> will that cause outsiders to look upon tor as unregulated and therefore
> unsafe?
>
> This is interesting so far... Who else has an idea?
>
> Beast
>
> Euman wrote:
>
> >On Mon, 2005-12-12 at 08:05 -0500, Void Beast wrote:
> >
> >>So are we doomed to the blacklist of the internet? Or are we on the
> >>bleeding edge of a new era of digital freedom? I can see this going both
> >>ways...
> >>
> >>Beast
> >
> >
> >if 'tor' is made to be respectable it shouldn't be blacklisted.
> >Anyone with ethereal can re-assemble packets so there goes the digital
> >freedom.
> >
> >There should be in place certain rules (what rules Im unsure of)
> >for instance on my box I allow 9001 for the Tor Server and 9030 for
> >the Directory service and Ive noted that any ip using ports
> >that aren't routed through the 'tor' application are auto-blacklisted
> >by me. I might be an open-proxy but I keep an eye on things so,
> >there should be a mechanism put in place for everyone that does
> >exactly what Ive described.
> >
> >e,g: inbound tor or-port - destination 70.71.72.73 app tor [allowed]
> > inbound tor or-port - destination 70.71.72.73 app null [denied]
> >
> >doesn't matter what port the destination goes to as long as it's routed
> >through the 'tor' application.
> >
> >How to implement this is beyond me atm with the exception of keeping a
> >steady eye on your firewall.
> >
> >Please inform me that I don't know what the hek I'm talking about and
> >that I should just shutup...
> >
> >my $0.04 (inflation)
> >
> >
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Desktop 9.0.2 (Build 2424)
>
> iQEVAwUBQ55P8W/n6vvd6AreAQiDFwgAqB2pim6Zg67dUf4jnaGvJqNIDW+LPPUv
> OeG+agAnMRsHSy0wK5QJjNzTM2QBZwAqujhZqjeUuKYkW8R/TKbQw+VvPj9eSFdb
> hXPUaryussf2HTwjERTESAImcgKL04/6lMoFrzjrcGy2XdfUQQTcICEmAgqzXjn1
> SEbxCOPGxCLJBf1vZZFuDJrGQ02hipgBmP98WFIQDBaXCrw9R6qMzAPGHPT16l9G
> R7ZZiX5gjqRTn+fiwNqoEehRofMgVUBx3tbnwxzZKXZT/Xv2Nu/RoAcPZoQn6R5M
> eGmpJYic0k/3oZUDXLytfistv4UH3+9Kxkrw6LjznLZBXIjkRpiDfA==
> =R9lV
> -----END PGP SIGNATURE-----
>
>