funneling a wireless net's outbound connections through tor
Gregory Maxwell
gmaxwell at gmail.com
Mon Oct 1 17:59:34 UTC 2007
On 9/28/07, Scott Bennett <bennett at cs.niu.edu> wrote:
> In order to keep such traffic distinguishable from my own local
> traffic, I intend to route it to tor on a second loopback interface
Instead why not consider running an exit node? You still may hear
something about the user's dodgy traffic, but you can prove you were
running a tor exit while going on about your open wireless might just
sound like a bunch of hand-waving.
As others have mentioned it would not be nice to toss people's traffic
into tor when they haven't been given a chance to understand the
implications.
More information about the tor-talk
mailing list