[tor-relays] Network Scan through Tor Exit Node (Port 80)

Robert Ransom rransom.8774 at gmail.com
Wed Mar 9 03:08:23 UTC 2011


On Tue, 8 Mar 2011 18:35:12 -0800
Robert Ransom <rransom.8774 at gmail.com> wrote:

> On Tue, 8 Mar 2011 04:04:13 -0600 (CST)
> Scott Bennett <bennett at cs.niu.edu> wrote:
> 
> >      On Sat, 26 Feb 2011 12:13:53 -0800 Chris Palmer <chris at eff.org> wrote:

> > >Using Tor to scan the internet is a good way to see how the internet looks from different perspectives at once, which can be quite valuable.
> > >
> >      I disagree and, as noted above, treat that as a cracking attempt.
> 
> Why do you consider a portscan to be an attempt to gain unauthorized
> access to your computer?

On second thought, now that you have publicly stated that you have
programmed your computer to detect portscans and respond to them by
malfunctioning, a portscan itself may very well be an attack on your
computer.


Robert Ransom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20110308/f732a416/attachment.pgp>


More information about the tor-relays mailing list