On Wed, Oct 02, 2013 at 08:34:05AM -0400, Jonathan D. Proulx wrote:
> On Tue, Oct 01, 2013 at 04:35:15PM -0700, Andy Isaacson wrote:
> :In summary, it seems likely that IaaS is pwned wholesale. Colo hardware
> :is somewhat more expensive to attack and possibly succeeds in raising
> :the bar from "
On Tue, Oct 01, 2013 at 04:35:15PM -0700, Andy Isaacson wrote:
:In summary, it seems likely that IaaS is pwned wholesale. Colo hardware
:is somewhat more expensive to attack and possibly succeeds in raising
:the bar from "software" to "attacker has to roll a truck to pwn me",
:which is my current
On Wed, 2 Oct 2013 02:21:13 -0400
grarpamp allegedly wrote:
>
> The community should make node placement more of a
> process under some metrics to avoid placement collisions.
> 'myfamily' is a concept that spans more than just the operator.
An interesting, and very valid point. One drawback of t
On Tue, Oct 1, 2013 at 7:35 PM, Andy Isaacson wrote:
> In summary, it seems likely that IaaS is pwned wholesale. Colo hardware
> is somewhat more expensive to attack and possibly succeeds in raising
> the bar from "software" to "attacker has to roll a truck to pwn me",
> which is my current recom
On Tue, Oct 01, 2013 at 04:42:53PM -0400, Jonathan D. Proulx wrote:
> As I understand it there are three risk layers in each Tor node:
>
> 1) The node operator (who has r00t)
> 2) The data center (who has net)
> 3) The legal jurisdiction
>
> I've recently started running a couple of relays on pu
Hi All,
There must be discussion of this I'm not finding so references to that
are welcomed.
As I understand it there are three risk layers in each Tor node:
1) The node operator (who has r00t)
2) The data center (who has net)
3) The legal jurisdiction
I've recently started running a couple of