[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

RE: Analyzing TOR-exitnodes for anomalies

I am very interested in this.  While not a tech guru, I would be happy
to assist (if I get any spare time).

My own TOR node on my colo'ed web server (200KB/sec baby - now THAT is a
contribution to the project) certainly doesn't do anything like this - I
was dumb enough to just install, configure & let er run.


-----Original Message-----
From: owner-or-talk@xxxxxxxxxxxxx [mailto:owner-or-talk@xxxxxxxxxxxxx]
On Behalf Of Alexander W. Janssen
Sent: Wednesday, October 04, 2006 9:33 AM
To: or-talk@xxxxxxxxxxxxx
Subject: Analyzing TOR-exitnodes for anomalies

Hi all,

considering that I heard from several people that they notice strange
sideeffects since a couple of days - altered webpage, advertisement
where no ads should be - I started a little investigation if there are
any obviously bogus exitnodes in the wild:


I welcome you to start your own investigation; if there are really bogus
exitnodes we should be aware of those and we should know their node's
nickname to put them on a shitlist.

This might leed to an escalation in the future when marketeers realize
the possibilities of altering traffic.

Comments, ideas, pointers to other projects?


"I am tired of all this sort of thing called science here... We have
spent millions in that sort of thing for the last few years, and it is
time it should be stopped."
 -- Simon Cameron, U.S. Senator, on the Smithsonian Institute, 1901.