On Sun, 2013-10-27 at 03:41 -0400, Michael Wolf wrote: > On 10/27/2013 12:15 AM, communicationsystem@xxxxxxxxxxxxx wrote: > > Tails uses one DNS server from OpenDNS. > > > > What prevents a malicious party from signing up exit nodes at OpenDNS and logging traffic, blocking content, and/or redirecting traffic? > > Assuming the malicious party runs the exit node, what prevents them from > doing any of these things anyway? OpenDNS authenticates by IP, so anyone using the exit node can change the OpenDNS settings if the exit node operator hasn't made an account. The exit node operator can do all of those things, but anyone using Tor can do them with OpenDNS. -- Sent from Ubuntu
Attachment:
signature.asc
Description: This is a digitally signed message part
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk