[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: What to do at IP number change?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: What to do at IP number change?
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Wed, 09 Jan 2008 19:21:02 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 09 Jan 2008 22:21:11 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; bh=H3MQH23S2Eagv60rYmFDOPuC+kaK7qh28yIXN/g1kmM=; b=wm3gosle9r8hV36mEabRAig+2Ndo+5PlnBlJiCA7pW7cYoVn7S9WvbCpcgmDYAj+3OAqP7plqBH5YdoB3oUBAm2SErC87AjZskqhwEdNRU2D9lUF0Cs9gOC3RNihsOT/WhV81xlN33hrOYEQ3CWHqSYIDfwPYIT6zbRRmfo1zAQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; b=H1kDDOzCiarI6z7A8MN00STAIIO3KebH1QWX+yB5cNUf1V5ZNv/SEfiqMNdhPjBGWO5x2nEkC1jjXoLFt3QxccdTuzlCu81Su4imS6gXWx4XN/Fg5vjA0No7J8ArKztrCroZW5VzP/x7x/vo3RFvGVVJegzonq67K3cjBqJaNgs=
- In-reply-to: <526065724@xxxxxx>
- References: <526065724@xxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.9 (Windows/20071031)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
dr._no@xxxxxxx wrote:
(snip)
|> Very true. This is one reason why I suggest only organizations (as
|> opposed to residential users) - who have the money, manpower, and other
|> resources to deal with legal issues - allow exits from any node they run.
|
| I think that's a bad idea because many people think that you can
identify a person
| by using the IP number and i don't want to support that myth. If
everyone would
| use tor, the only sure thing about IP numbers and identification would
be that if you
| find an IP number in an log file, you can be sure that this person
(the one who pays
| for that internet access) was NOT there!
| Another point is that without a tor server my home would be vulnerable
to traffic
| analysis and a further point is that a tor server is more safe than
only a client.
(snip)
Running a middleman node can provide some level of plausible
deniability, since all strongly encrypted traffic basically looks a
pseudorandom stream.
However, running an exit node can bring quite a bit of liability. Even
if it's technically legal, it takes forever to get it cleared up; a home
user would likely get all of their equipment seized for quite some time.
Also, it's easier to steamroll a home user legally. Therefore, I think
it's quite unwise for home users to allow exits, at least at the present
time.
This is just my opinion, though - and the one I choose to use in the
running of Kitsune-OR. If others want to take the risk, they're welcome
to; YMMV.
- --
F. Fox: A+, Network+, Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFHhY8ebgkxCAzYBCMRCGXWAJ9dlbNc21xwsn6XFhDRCdiNjcNoJgCfenh5
7RVqZKLZReA3uh+kQe5fCm0=
=am+X
-----END PGP SIGNATURE-----