[90865] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Tor and network security/administration

daemon@ATHENA.MIT.EDU (Chris Kuethe)
Sat Jun 17 10:25:33 2006

Date: Sat, 17 Jun 2006 08:25:07 -0600
From: "Chris Kuethe" <chris.kuethe@gmail.com>
To: nanog@merit.edu
In-Reply-To: <20060617132902.GA56012@icarus.home.lan>
Errors-To: owner-nanog@merit.edu


On 6/17/06, Jeremy Chadwick <nanog@jdc.parodius.com> wrote:
> The problem I see is that this technology will be used (literally,
> not ideally) solely for harassment (especially via IRC).  I do not
> see any other practical use for this technology other than that.
> The whole "right to privacy/anonymity" argument is legitimate, but I
> do not see people using* Tor for legitimate purposes.

My legitimate use of Tor is because I object to companies following me
around on the net. Yes, I block ads and reject cookies, too. I choose
to not disclose my browsing to others. I get enough random commercial
crap foisted upon me that I have no time or patience for the targetted
commercial crap. To paraphrase Zimmerman's philosophy of PGP - you may
be having a hot affair, or you may be doing something politically
sensitive, but it's nobody's business but yours.

As for an attempt at a technical control, maybe set up a box with Tor
on it, get a list of exit servers and null-route them automagically.

CK

-- 
GDB has a 'break' feature; why doesn't it have 'fix' too?

home help back first fref pref prev next nref lref last post