On Tue, 8 Mar 2011 18:35:12 -0800 Robert Ransom <rransom.8774@xxxxxxxxx> wrote: > On Tue, 8 Mar 2011 04:04:13 -0600 (CST) > Scott Bennett <bennett@xxxxxxxxxx> wrote: > > > On Sat, 26 Feb 2011 12:13:53 -0800 Chris Palmer <chris@xxxxxxx> wrote: > > >Using Tor to scan the internet is a good way to see how the internet looks from different perspectives at once, which can be quite valuable. > > > > > I disagree and, as noted above, treat that as a cracking attempt. > > Why do you consider a portscan to be an attempt to gain unauthorized > access to your computer? On second thought, now that you have publicly stated that you have programmed your computer to detect portscans and respond to them by malfunctioning, a portscan itself may very well be an attack on your computer. Robert Ransom
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays