[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Electronic surveillance on major tor exits




I meant "we" as in "our nodes." I can guarantee any node you run (of size) sees that kind of traffic run through it. If you think it doesn't, I suspect you'll change your mind after spending 30 seconds on IRC talking to an average user.



On 7/26/2012 7:57 AM, mick wrote:
On Mon, 23 Jul 2012 11:03:24 -1000
Name Withheld <survivd@xxxxxxxxx> allegedly wrote:
Most Tor users probably don't read the manual and follow best
practices.  I'm sure we've all seen traffic where users are using
google maps to find directions from their home, or logging into their
true-name mail accounts.  When you combine this "State of our Method"
with a choke on the number
I'm surprised that no-one else seems to have picked up on this. But no,
"we have /not/ all seen traffic where users" are doing something....
Because we aren't looking at user's traffic. And we damned well should
not be.

Mick
---------------------------------------------------------------------
blog: baldric.net
fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312

Note that I have recently upgraded my GPG key see:
http://baldric.net/2012/07/20/gpg-key-upgrade/
---------------------------------------------------------------------


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays