[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: The use of malicious botnets to disrupt The Onion Router
On Fri, Feb 01, 2008 at 10:59:18PM -0800, Ben Wilhelm wrote:
> A manually administered . . . centralized list? Because, call me crazy,
> but a centralized list of "authorized routers" has some very, very
> obvious flaws in it, both technical and security-related.
Some of us Tor operators know other Tor operators. As such a (web of)
trusted core network would be valuable.
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE