[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Child pornography blocking again
- To: or-talk@xxxxxxxxxxxxx
- Subject: Child pornography blocking again
- From: Kraktus <kraktus@xxxxxxxxxxxxxx>
- Date: Thu, 24 Jan 2008 07:38:14 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 24 Jan 2008 07:38:25 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; bh=d8Sd1ioEmkmbJEd9gkp9bjfWbS0yaVk9+liE53CaRuk=; b=ljZEd8ZtVvc6ATLXyZbAoX/JUTpUPFEQ4lVUEFrQ9u8fBjhLgksyfbtmriIvLp39NaU7qof/5htFAq4Hhekw6Lx+OXPQIcOHXSMLDq0HiCH2v95Lbku1/bNrH+tWv1g0yfqz6IVSh9cbUeM88uz0m2oXhiBI5SjE2K9/5fB2iW8=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=eXq31f4d0g+awC56JCCXmd3UAdQyQFLBM7nBb7Ja8qy7HH4W3p2CaBa0z9NF/ydkxRU5S0JyTCkB7wl4n4ToHq4/ob0a8Izi92f12Pq/n4LxbNPQ1YrM4krXRP3yuYDbNAwN+gXFCv6ifIGaWm5DtI+80YaN8BmhPkRrtsdI95I=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Okay, here's my idea: Suppose exit servers included the term 'reject
cp_blacklist' in their torrcs. If it worked well, it could be
included in the default exit policy.
cp_blacklist could be a variable rather than an explicit IP address or
hostname. The IP addresses and hostnames included in that variable
could be known by the directory authorities, so that it could be kept
By making the blacklist directory information, Tor clients would only
have to download the list once each time they get the directory, not
separately for each exit server.
I realise, of course, there are problems with this.
* If the IP address is shared, there might be a child porn site on the
same IP as a legitimate site.
* hostname-based filters can be bypassed.
* User-contributed legitimate sites can sometimes have child porn on
them, until their management notices the material and takes it down.
While getting the management to take the material down should be
preferable to adding the site to the blacklist, the material will
still be available via the Tor network during the interim.
* Blacklists are never complete anyway.
* Definition of 'child porn'. Perhaps separate variables, e.g.
cp_blacklist_strict, cp_blacklist_normal, cp_blacklist_conservative
could be used to deal with this somewhat?
* Backwards compatibility. Maybe client recognition of variables
could be added a few versions before servers are given the ability to
use them? One would also want the variables to be able to include
other variables, so, for example, cp_blacklist_normal would be
cp_blacklist_conservative plus a list of additional IPs and hostnames.
Is this idea even feasible?