[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Anyhoo...
- From: "Ringo Kamens" <2600denver@xxxxxxxxx>
- Date: Mon, 26 Feb 2007 18:29:24 -0700
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivery-date: Mon, 26 Feb 2007 20:29:40 -0500
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=Vqn5hmPXy8LfE9Kf4eET4QJwa7xem75ntiwUKCr1dAWoy5fcqLkFhHAWNu1RYTl36qvZiWdrg9UYImwzsdQNQca4JiikMe1Ns+pmM1/ewgos048y0TyT4czUpFt+Nvejg3xISC1XGgpNmcEGep5RBRrd+IMjBUrh28b0N6WI0Nc=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=FaewxhsKNAZtZZ+Gt6T69gd9TIwMAIlxz+RJvZejhCxwbRZd5lCerMI2mz/R/PiElAJZTqO43KTqeIso3iGc3mdGVVCSdCTe/Pd7Pe4a2CBV6TfYmjIUrbw+YGmAP+qw/oTi1HYCn9e+RlpchHOBLXorIIGYwERobMc2WACpByY=
- In-reply-to: <firstname.lastname@example.org>
- References: <email@example.com>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
I agree this is something that should be done with the tor controller.
Another thought for people is that they may be going through servers
that are known to be used by intelligence organizations or have a high
logging rate. One problem you might encounter when going through tor
servers on educational/corporate networks is the high amount of
logging that happens. Theoretically, it shouldn't matter but
realistically it does. I suggest windows users check out peerguardian
(peerguardian.sourceforge.net) to block these servers if you wish.
(Linux people check out MoBlock). I did notice that NATO C3 ran a tor
server which is enough to convince me to watch who I connect to.
On 2/26/07, Robert Hogan <robert@xxxxxxxxxxxxxxx> wrote:
On the face of it, forcing tor to be 'geo-diverse' (dread word) is fairly
The option is called NodeFamily. Ask the author of your favourite tor
controller to implement something like 'Enforce Geoographical Diversity'
instruct tor to treat all servers in the same country as a nodefamily.
Of course, you could also do it yourself using:
The chances are Tor itself will never do this for you - it has kludge
all over it. Also while it might mitigate looping through the same ISP at
entry and exit, it will probably make you statistically *more* likely to hit
a global adversary, such as, erm, world gentil(l?)ery.
Thoughts anyone? Worth doing?
KlamAV - An Anti-Virus Manager for KDE - http://www.klamav.net
TorK - A Tor Controller For KDE - http://tork.sf.net