[tor-relays] exit node experience: abuse over HTTP, stealrat infection

Rejo Zenger rejo at zenger.nl
Sun Oct 19 13:53:12 UTC 2014


++ 19/10/14 13:48 +0000 - obx:
>Same here, I've blacklisted their /24 in my torrc. The complaints
>stopped.

That is not a sound approach: i) Tor clients will see unexpected 
connection errors as some destinations are unreachable where they 
should and ii) in some legal systems this may mean you can be held 
responsible for the traffic that is routed via your node. 

-- 
Rejo Zenger
E rejo at zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl  
T @rejozenger | J rejo at zenger.nl
OpenPGP   1FBF 7B37 6537 68B1 2532  A4CB 0994 0946 21DB EFD4
XMPP OTR  271A 9186 AFBC 8124 18CF  4BE2 E000 E708 F811 5ACF
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 931 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20141019/257ba9cd/attachment.sig>


More information about the tor-relays mailing list