reconsidering default exit policy

Chris Palmer chris at eff.org
Mon Aug 29 16:34:20 UTC 2005


Richard Johnson writes:

> But the controllers of those bots often will try to use tor.

Do you have any evidence for this? I have assumed it was possible and
that some people might do it, but have you actually seen it happen?

> You may feel that IRC is one of those protocols that, like SMTP and
> NNTP, is aggressively unauthenticated and prone to abuse.

Authenticated protocols are prone to abuse, too. ;) Often the
authentication mechanism itself is the abused component.


-- 
http://www.eff.org/about/staff/#chris_palmer

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050829/f0bb234c/attachment.pgp>


More information about the tor-talk mailing list