[tor-relays] Intrusion Prevention System Software - Snort or Suricata

Tristan supersluether at gmail.com
Wed Oct 5 22:05:23 UTC 2016


Then what _can_ we do? Because as it stands, Tor is the perfect tool for
criminals, and your stand is "do nothing." An ISP can trace illegal
activity to a user, we can't. Even if Tor is considered an ISP in that
sense, the rules vary by country, maybe even by provider.

I'm being to think there is no real solution to the problem. As long as Tor
serves its purpose of providing uncensored access to the Internet, bad guys
will always abuse it, and the operators will almost always be at odds with
their ISP. Anything we try to do to block abuse will destroy the very
concept of Tor.

On Oct 5, 2016 4:51 PM, "Green Dream" <greendream848 at gmail.com> wrote:

> @Markus
>
> Okay, so you are offended by the phrase "it's that simple". Sorry, if
> I could remove that sentence I would. I didn't mean to imply that
> running an exit was trivial or easy.
>
> Otherwise, I stand by my argument -- automated filtering or blocking
> is not the right answer. The co-founder of Tor already said as much in
> this thread: "it would seem that using an IPS is fundamentally
> dangerous for relay operators".
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161005/bdb199ea/attachment.html>


More information about the tor-relays mailing list