[186939] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Anonymous Threats

daemon@ATHENA.MIT.EDU (Todd Crane via NANOG)
Sun Jan 10 18:28:41 2016

X-Original-To: nanog@nanog.org
In-Reply-To: <C820E8FCB95D264B9F200903B532BD2402733F67@equinox.precisionds.com>
Date: Sun, 10 Jan 2016 16:28:34 -0700
To: North American Network Operators' Group <nanog@nanog.org>
From: Todd Crane via NANOG <nanog@nanog.org>
Reply-To: Todd Crane <todd.crane@n5tech.com>
Errors-To: nanog-bounces@nanog.org


--Apple-Mail=_3BC3CCC6-A437-4286-9F2F-E6DA4977461C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

I=E2=80=99m pretty sure that is what TOR was designed to prevent. While =
your intent may be altruistic, technologically speaking, there is no =
difference between that and say Iran or China sniffing out traffic.


> On Jan 10, 2016, at 3:59 PM, Eric Rogers <ecrogers@precisionds.com> =
wrote:
>=20
>  Is there any way to sniff for that type of traffic
> on my network?


--Apple-Mail=_3BC3CCC6-A437-4286-9F2F-E6DA4977461C
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJWkukjAAoJEJnIJbSiHxpVVfIIAIe7O29mPhxi+dEVpg6VBh0Y
lROGVxd0VM+B+sHdU41DFn8L/lL9vQCLh3FOzfTSkPOMKam9zyzKdKG8xCAhDMpl
sVjZy3j9y1BdMHUSSUfftR+gJZUVkLwHfqq7Gmh4PIdqx4Kr7EVGdb3hL4iS/6dY
UziZB1PHCZpzNrZawIB2BemhGOpCjGMQVaCuvo8TXTQ55NmHRr+qZE2YaSQJ1e/u
nOZTDFCc0Aw2Avsn+CPMvEceTclTOcknomXg28EZQEOAhM9PMOtagQmXj/zx3qFd
kDqlUTl9nkeMrJtiNpf8Zob+vs7bqJFva9sw7duVDdsn/5PFiL2p3fj5XbzMWmE=
=zkM9
-----END PGP SIGNATURE-----

--Apple-Mail=_3BC3CCC6-A437-4286-9F2F-E6DA4977461C--

home help back first fref pref prev next nref lref last post