On Apr 19, 2009, at 10:21 AM, Tripple Moon wrote:
Your list doesn't include for example 22 (ssh), which
is absolutely essential for many of us.
Well see...from my point of view SSH is abuse of the tor-network,
namely aiding in hacking other systems. (see my other posts for my
logic)
To use SSH you need an account thats under normal circumstances is
known on the other side, thus eliminating the need to anonymize your
connection.
So yea i will advice all that read this to reject that port whole
heartly...
IMHO, the intentions of the tor-network are to provide anonymity for
data connections where the other side does not _need_ to know who
the originator is.
If i'm wrong there i'm sure it will be told so by many instead of
one...
Tor is _not_ just about hiding who you are to a service provider, but
also about hiding where you go from a local observer (your ISP, other
people on the same network, etc). Also, access of blocked services
certainly is a big aspect here. Same goes for hidden services - I
might be the only person who knows the address of my hidden service,
and it's still a valid use case.
Please don't try to provoke a big stream of "I think you're wrong,
too" emails. Go read the website first.
Sebastian