[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: funneling a wireless net's outbound connections through tor
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: funneling a wireless net's outbound connections through tor
- From: "Gregory Maxwell" <gmaxwell@xxxxxxxxx>
- Date: Mon, 1 Oct 2007 13:59:34 -0400
- Cc: or-talk@xxxxxxxx
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 01 Oct 2007 13:59:43 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; bh=XlYXsSze3+I1T9q2WF0K20W6epZuI89/bt/TnNZqupk=; b=d8Nm1ABfDSwRBdyb2F/d5k942Ky1pqd/acEweC1IPyynktjn4UheYlc262il2kq+6oEh2n/NXaUJu47adXgE2gvWlhQdyC4Ven5oyJ5BT9TiesckSjoFKwMFrIQhOZr74q62ZbqMdmLTzFd6fD89EVefaxCM+y28Z7Jm4x8/zW8=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=IGvfBr3ZsInisZ8PrNZ8Vrddtwabc/2WQGtg2QvWFfYKEfxES1xAc2M3na5ktwGTrQV2x81GO+M0ayB3kAyL5YAVtss3d+T/dMdtvS5xaEuHAyYCZQJM8oAKua4rJvmRwIw2kybcRzHjpeGlerqFS8sC5crEn8DTIw50ZAtje7w=
- In-reply-to: <200709282135.l8SLZcTp001175@xxxxxxxxxxxxx>
- References: <200709282135.l8SLZcTp001175@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On 9/28/07, Scott Bennett <bennett@xxxxxxxxxx> wrote:
> In order to keep such traffic distinguishable from my own local
> traffic, I intend to route it to tor on a second loopback interface
Instead why not consider running an exit node? You still may hear
something about the user's dodgy traffic, but you can prove you were
running a tor exit while going on about your open wireless might just
sound like a bunch of hand-waving.
As others have mentioned it would not be nice to toss people's traffic
into tor when they haven't been given a chance to understand the
implications.