Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Anthony DiPierro
On 8/21/06, Michael Holstein <[EMAIL PROTECTED]> wrote: If you're using TOR, you shouldn't be using your name in the first place (what's the point of *anonymously* identifying yourself?). I know there are other arguments for TOR like defeating geolocation, but if that's all you're after, there a

Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Nick Mathewson
On Fri, Aug 18, 2006 at 08:49:07PM -0700, Anothony Georgeo wrote: > Hi, > > I have been thinking about the issue of exit node > operators and/or adversaries sniffing clear-text > ingress/egress traffic locally and/or remotly on an > exit node. I have a possible solution but I would > like the Tor

Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Michael Holstein
> 4. A couple dozen _fast_ 24x7 exit nodes are run by > trusted operators (read: known personally by Nick or > Roger) on a local machine the operators control. The $3_letter_agency would just *love* to have a dozen places (or 2 people) they already know about to serve the subpoenas. > 7. All Tor

Re: Exit Node sniffing solution...an idea...

2006-08-19 Thread Marco A. Calamari
On Fri, 2006-08-18 at 20:49 -0700, Anothony Georgeo wrote: > Hi, > > I have been thinking about the issue of exit node > operators and/or adversaries sniffing clear-text > ingress/egress traffic locally and/or remotly on an > exit node. I have a possible solution but I would > like the Tor devs.

Exit Node sniffing solution...an idea...

2006-08-18 Thread Anothony Georgeo
Hi, I have been thinking about the issue of exit node operators and/or adversaries sniffing clear-text ingress/egress traffic locally and/or remotly on an exit node. I have a possible solution but I would like the Tor devs. and experts here to weigh-in. If this won't work feel free to ignore th