[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: The use of malicious botnets to disrupt The Onion Router
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: The use of malicious botnets to disrupt The Onion Router
- From: "Michael_google gmail_Gersten" <keybounce@xxxxxxxxx>
- Date: Sun, 3 Feb 2008 16:32:48 -0800
- Cc: "Ron Wireman" <ronwireman@xxxxxxxxx>
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 03 Feb 2008 19:33:05 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; bh=xgXdvySYPcK3ABFRyF7J6y+iEGq6WFSt54ivIeaGzHk=; b=C5hXnfg7E/4/D3OUf2T/DtDem92zfJt8cDf+ZmKBCHpCRiRT0b/kQyCAr+SKme+jy/TZSZ1qdK18Wi6X7XG4fUrdu1RZJA/WZoT+qEk18MRLAuxCNRRZDfCc6Onf0PExnr4iFgp2kYzQUJGH/A3Ol2RQaxhzlOtvzwl38OxusA8=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=vG2QMShyVY4mp42L5kPckdkOOnH3sWxxKcszXCUY4HXtVOGOSftYf/GK6QY/GHp3sHs+LAwqZFeBihNwKmIGQQaoLDPEmIPS0MHUbUhTfwd/k8AWSMYoOt+OOkyFmpNbH9raIRhgtga9wMEfx6KdhAPlf+stU5ssTHRXWByQ6dQ=
- In-reply-to: <156192.97932.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- References: <156192.97932.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
> The problem of corrupted exit servers is indeed one that we should all
> ponder until a solution may be found.
We have entry guards, with the purpose of reducing the chance of
someone who has control of multiple nodes from tying your entry and
exit information together.
Why not have exit guards, to reduce the risk of malicious exit nodes
from causing problems?
(Did I already make that suggestion a few months ago? It seems familiar).