[115521] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: tor

daemon@ATHENA.MIT.EDU (Aaron Porter)
Thu Jun 25 11:38:45 2009

In-Reply-To: <bb0e440a0906242050x3d135005j18dfc0728458f3e7@mail.gmail.com>
Date: Thu, 25 Jun 2009 08:37:58 -0700
From: Aaron Porter <atporter@gmail.com>
To: Suresh Ramasubramanian <ops.lists@gmail.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, Jun 24, 2009 at 8:50 PM, Suresh
Ramasubramanian<ops.lists@gmail.com> wrote:
> Running what's effectively an anonymous open proxy is not a bright
> idea, even if there's security bundled on..
>
> John Gilmore found that out after Verio disconnected his perpetual
> open relay for example .. =A0and TOR is just as nutty a concept.
>
> Nothing less that I'd expect from the EFF, frankly speaking - but
> clued people (and you are clued, for sure) shouldnt be running it.

Would you feel better if instead of "Tor" it was called "Crowds" and
instead of those rapscallions at the EFF it was a nice respectable
AT&T Research project from Avi Ruben? I bet I still have my "Anonymity
Loves Company" shirt somewhere... Anonymous speech is a vital concept
if you expect Free speech.

http://avirubin.com/crowds.pdf


home help back first fref pref prev next nref lref last post