Tor limitation

ADB firefox-gen at walala.org
Wed Nov 16 00:14:53 UTC 2005


Yeah. Go I2p and tor rendezvous! Seriously though, someone on EFF or 
IETF's payroll has got to be willing and able to go over there and check 
it out. If these orgs REALLY want to know what's going on over there and 
help people, they need current, reliable information, right?

Matt Thorne wrote:

>I Would be willing to bet that the most effective P2P over there
>(behind the wall) are Darknets.
>
>as briefly mentioned here:
>http://www.cio.com/archive/110105/tl_filesharing.html?action=print
>and
>http://www.darknet.com/darknets/
>
>I was just thinking about how I would go about finding information on
>best anonymity practices in china, but realized that information would
>probably be hard to come by. The ones that failed probably arent able
>to be talked about (stupid censorship), and the ones that are working
>probably aren't advertised anywhere.
>Brings to mind bashing my head up against a wall... so let the head
>bashing commence...
>
>-=Matt=-
>On 11/15/05, ADB <firefox-gen at walala.org> wrote:
>  
>
>>Has the EFF sent anyone to China to check this out and hopefully get some
>>more details? It would be especially interesting to find out what the
>>situation is for other P2P and anonymity networks w/in china. If they are
>>alive, how? If they got canned, what were their mistakes that lead to it?
>>~Andrew
>>
>>Matt Thorne wrote:
>>most of the censoring, in china at least, is done automatically with
>>    
>>
>no
>  
>
>>human intervention. In my statement I ment that having an exit node
>>    
>>
>behind
>  
>
>>the firewall would give us the same restrictions that they are
>>    
>>
>having to
>  
>
>>deal with right now. for most people that really wouldn't
>>    
>>
>impact their lives
>  
>
>>that much, except that there would be some pages
>>    
>>
>that you counldn't view,
>  
>
>>and some messages that you couldn't send.
>>    
>>
> BUT.
>there is always a but,
>We,
>  
>
>>for the most part, are from countires that don't have restrictions
>>    
>>
>on
>  
>
>>speach, so we would set off all of the flags that the censoring
>>    
>>
>software was
>  
>
>>looking for, and the ISP would be ordered to cut the
>>    
>>
>connection pretty
>  
>
>>quickly. Personally I don't think that an exit or
>>    
>>
>entry server would last
>  
>
>>more than 5 minutes on china's web.
>>    
>>
>
>On 11/14/05, Bob <monfster at gmail.com>
>  
>
>>wrote:
>>    
>>
>
>  
>
>>Well, the faq says "If you want to avoid most if not all abuse
>>potential,
>>    
>>
>set it to "reject *:*". This is called being a "middleman" node."
>  
>
>>- but can
>>    
>>
>that also be an Entry node?
>
>However, I think someone running any
>  
>
>>type of tor SERVER node behind the
>>    
>>
>Great Firewall would have a lot more to
>  
>
>>worry about than just pissing off
>>    
>>
>their isp...
>
>-----Original
>  
>
>>Message-----
>>    
>>
>From: owner-or-talk at freehaven.net
>  
>
>>[mailto:owner-or-talk at freehaven.net] On
>>    
>>
>Behalf Of ADB
>Sent:
>  
>
>>Monday, November 14, 2005 2:09 PM
>>    
>>
>To: or-talk at freehaven.net
>Subject: Re: Tor
>  
>
>>limitation
>>    
>>
>
>OK. I was going to say, "Tor should be able to get through it!".
>  
>
>>The point
>>    
>>
>is, if you have a bunch of tor nodes, especially geographically
>  
>
>>disparate
>>    
>>
>ones, the load should be spread out, no?
>Are they default-allow or
>  
>
>>default-deny over there?
>>    
>>
>
>Bob wrote:
>
> I think there was a tag missing - I
>  
>
>>think it was:
>>    
>>
>
> <Sarcasm>yes I really want to use an exit node that is
>  
>
>>located
>>    
>>
>behind the
> great
> firewall...</Sarcasm>
>
> -----Original
>  
>
>>Message-----
>>    
>>
> From:
>  
>
>>owner-or-talk at freehaven.net
>>    
>>
>[mailto:owner-or-talk at freehaven.net]
>  
>
>>On
>>    
>>
> Behalf Of Arrakistor
> Sent: Monday, November 14, 2005 1:34 PM
> To: Matt
>  
>
>>Thorne
>>    
>>
> Subject: Re[2]: Tor limitation
>
> Hello Matt,
>
> Somehow, I don't
>  
>
>>think China will kindly look upon those running
>>    
>>
>Tor
> servers inside their
>  
>
>>country. Infact, I am concerned about
>>    
>>
>the
> integrity of Tor servers which
>  
>
>>have data passing through
>>    
>>
>Chinese
> servers, as it seems hard to believe
>  
>
>>their government would allow
>>    
>>
>them
> to exist without their approval.
>
> Has
>  
>
>>anyone else had such concerns, or any answers to such concerns?
>>    
>>
>
> Regards,
>
>  
>
>>ST
>>    
>>
>
>
> Monday, November 14, 2005, 3:18:21 PM, you wrote:
>
>
>
> yes I really
>  
>
>>want to use an exit node that is located behind
>>    
>>
>the great
> firewall...
>
>
>
>
>
>  
>
>>On 11/14/05, ADB <firefox-gen at walala.org>
>>    
>>
><mailto:firefox-gen at walala.org>
>  
>
>>wrote:
>>    
>>
>
>
> Here's an easy solution for our buddies under commie
>control: SET
>  
>
>>UP MORE
>>    
>>
> TOR EXIT NODE & DIR SERVERS! It's not tha hard! ;)
> ~Andrew
>
>  
>
>>Darren Griffith wrote:
>>    
>>
> Many of the Chinese who are using tor
>  
>
>>are
>>    
>>
>complaining that it is too
>
>
> slow to
>
>
> be usable by them. I imagine
>  
>
>>that those who feel
>>    
>>
>they need to
>
>
> use this
>
>
> program don't mind it being
>  
>
>>at about dial-up speeds.
>>    
>>
>
>
>
>
>
> I'm in Beijing and I'm happy that Tor is
>  
>
>>there when
>>    
>>
>I need it. In
>
>
> fact,
>
>
> en.wikipedia.org is now blocked by my
>  
>
>>ISP, so Tor is
>>    
>>
>almost
>
>
> essential. But
>
>
> yes, it's pretty slow, though I'm
>  
>
>>patient. Only
>>    
>>
>lately,
>
>
> I'm consistently
>
>
> getting DNS lookup failures,
>  
>
>>and that's what's
>>    
>>
>mostly
>
>
> eroding my experience
>
>
> of using Tor all the
>  
>
>>time. (I know I should
>>    
>>
>
>
> change the config of my client
>
>
> to give more
>  
>
>>logging info so I can
>>    
>>
>
>
> track down this bad exit node, but I
>
>
> haven't
>  
>
>>made the effort yet.)
>>    
>>
>
>
>
>
>
> --
> Darren Paul
>
>
> Griffith
>
>
>  
>
>>www.madphilosopher.ca
>>    
>>
>
>
>
>
>
>
>
>
> --
>
>
>  
>
>><a
>>    
>>
>
>
>
>href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu
>  
>
>>age=us&domain=PHOENIXOFLIGHT.COM"
>>    
>>
><http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u
>s&domain=PHOENIXOFLIGHT.COM>
>  
>
>>>The
>>>      
>>>
>
>
> domain Phoenixoflight.com is for sale!</a>
>
>
>
>
>
>
> --
> Best regards,
>  
>
>>Arrakistor
>>mailto:arrakistor at gmail.com
>>    
>>
>
>
>
>
>
>
>
>
>--
><a
>href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&langu
>age=us&domain=PHOENIXOFLIGHT.COM"
><http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=u
>s&domain=PHOENIXOFLIGHT.COM>
>  
>
>>>The domain Phoenixoflight.com is for sale!</a>
>>>      
>>>
>
>
>
>
>  
>
>
>
>  
>
>>--
>>    
>>
><a
>  
>
>>href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">The
>>domain Phoenixoflight.com is for sale!</a>
>>
>>    
>>
>
>
>
>  
>

-- 
<a href="http://www.sedo.com/search/details.php4?tracked=&partnerid=19673&language=us&domain=PHOENIXOFLIGHT.COM">The domain Phoenixoflight.com is for sale!</a>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20051115/92023c71/attachment.htm>


More information about the tor-talk mailing list