[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
RE: How do we defeat exit node sniffing?
think you could make a case for trusting 1 or a handful of exit nodes, and
use ExitNodes abc and StrictExitNodes 1 to make sure you only use those for
sensitive authentication connections like you are asking
example, do you think blutmagie is sniffing? When it is trusted as a
V2 and Hidden Service Directory Authority?
BostonUCompSci? It would be kind of embarrassing to Boston University
wouldn't it, if they were found to be sniffing?
is probably too much to expect at this point, though, that a list of
trusted exit nodes will be publicly compiled. I think you have to do your
own investigations and come up with your own list.
so what do you all suggest if I must
authenticate to a non ssl connection? How do I do it anonymously and
On Thu, Jun 5, 2008 at 5:37 PM, Christopher Davis
services, and mind the authenticity of server certs.
On Thu, Jun 05, 2008 at 05:01:34PM -0700, defcon
> What are some good ways to defeat exit node sniffing?
Is there a listing of
> good exit nodes that do not
Or use Tor hidden