[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: The use of malicious botnets to disrupt The Onion Router



On Fri, Feb 01, 2008 at 10:59:18PM -0800, Ben Wilhelm wrote:

> A manually administered . . . centralized list? Because, call me crazy, 
> but a centralized list of "authorized routers" has some very, very 
> obvious flaws in it, both technical and security-related.

Some of us Tor operators know other Tor operators. As such a (web of) 
trusted core network would be valuable.

-- 
Eugen* Leitl <a href="http://leitl.org";>leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE