[tor-dev] protecting users from known relay groups with end-to-end correlation capabilities

nusenu nusenu at openmailbox.org
Fri Dec 2 23:32:00 UTC 2016

>> Examples (generated daily):
>> https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups.txt
>> (see CC)
> This is a useful check, but it is insufficient.
> Can you please produce a similar list for middles and exits by the same
> operator?


>> 1) try to contact the operators and give them time to fix it
>> I've done that multiple times but haven't been successful [1]
> Have you tried emailing them individually?
> I've typically got better results that way.

Yes I did.
Just one example:

>> 2) build tools to easily/automatically manage MyFamily
>> done[2], but it is unlikely to be used
> Maybe one solution is to build a generic tool that works with more than
> just ansible?

other example by coldhakca

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20161202/54606776/attachment.sig>

More information about the tor-dev mailing list