[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Filtering traffic from your node - for exit points

phobos@xxxxxxxxxx wrote:
On Mon, Sep 10, 2007 at 04:43:17PM -0700, torified00@xxxxxxxxx

I am not a lawyer, but I believe by doing this you're actually opening
yourself up to more liability than you'll ever correct.
https://tor.eff.org/eff/tor-legal-faq.html.en#ExitSnooping is
effectively what you're doing.
> affirmatively monitor, log, or disclose Tor users' communications

I am not monitoring the communication as such, neither am I logging it. The point is that an automated process filters out content that is questionable by my moral standards.

If the users were to be made aware that their connections can be filtered, but not sniffed per se (think in the line of an EULA) then we'd stand a good chance of cleaning up tor's act. Reading up on the German guys discussing how many times they've had their equipment seized leaves me with a slightly bad feeling - we are not telling tor operators that there's a good chance this might happen to them.

Let me put my standpoint in a little analogy. Gun vs. Tor.

Tor = Gun (both a neutral tool, that has both positive and negative uses)
Bad Tor User = Murderer (someone doing something wrong)
Tor node operator = Guy holding the gun for the murderer (?)

If I have the ability to pull the gun away in time (ie: filter the content) and if I'm successfull 90% of the time, it's better than if I'm unsuccessful all of the time. Right?


Be a better Heartthrob. Get better relationship answers from someone who knows.
Yahoo! Answers - Check it out.