[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Why TOR Operators SHOULD always sniff their exit traffic...



On Thu, Jun 09, 2005 at 12:36:43PM -0700, Parker Thompson wrote:

> projects.  Further, I see this as far preferable to letting operators
> develop their own best practices on an ad-hoc basis.

There's value in social contracts such as a web of trust between operators,
but the best solution is obviously just seeking safety in numbers. If Tor node density
in address space is sufficiently high, both the performance improves (it is not really 
practical for impatient users right now), and traffic analysis/exit node snooping 
becomes prohibitive for any adversary (save of the persons controlling
software upgrades for populars OSses, of course).

-- 
Eugen* Leitl <a href="http://leitl.org";>leitl</a>
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

Attachment: signature.asc
Description: Digital signature