[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Maximize Anonymity Services but Minimize 'Abuse Like' Behaviors...
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Maximize Anonymity Services but Minimize 'Abuse Like' Behaviors...
- From: "Gregory Maxwell" <gmaxwell@xxxxxxxxx>
- Date: Fri, 2 Jan 2009 13:25:00 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Fri, 02 Jan 2009 13:25:13 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=kHnd+z1kYm657tGgFlHP95IfXpfl96HL5LsAt/hS7OE=; b=w9zyhbHYbtE241mvsxPC0KYdZWJVXLfAOLx2mkn8StkutiINlWfN4G+GYeZbvGJ+Cu /uT+1QGFkozQE1MZevVA8NakflXAPxXhH9zDCh3/8+He27MOHfYgG9vpC6GDZFuHUCgG 1BPDqPJMepNanasdGI9UbGd64V36pAtQoU1oM=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=mcec9rUN/VH9gVPPjHeQ+LgGKYW10HVcKD/2dYBv60HiJKx7GXKl3PKsYFh2OfJTl4 RvWRGjO98OvH0Z/9FSZj6tmF6HS2umesNJG/TqVERJ2z3VDnvFUb/L5XvxlTIo3Jqays Fk4yneeal5AwHCQw7eG4yzd2VT53+Z3OQF9To=
- In-reply-to: <70f3db9f0901020843o48fc0a27ta8cac6e8e483f4a6@xxxxxxxxxxxxxx>
- References: <70f3db9f0901020843o48fc0a27ta8cac6e8e483f4a6@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Fri, Jan 2, 2009 at 11:43 AM, Erik Heidt <erik.heidt@xxxxxxxxxxxxxxxx> wrote:
[snip]
> - Permitting exit to key informational resources (e.g. wikipedia services)
> - Permitting exit to top 5 or 10 web mail services (e.g. google mail,
> hotmail, yahoo, etc.)
And manage to make yourself look like someone doing a targeted MITM
attack on tor users. :(
The above use cases should be handled by improving the exit enclave
support and convincing these sorts of major sites to run their own
exists.
If you'd like to cut abuse without looking like an attacker yourself
you're best off limiting your exit to ports which cause few abuse
complaints. IRC and other chat protocols are probably good examples.