Time Warner bad / VPS recommendations

Scott Bennett bennett at cs.niu.edu
Tue Feb 10 02:36:43 UTC 2009


     On Thu, 5 Feb 2009 16:14:29 -0500 Praedor Atrebates <praedor at yahoo.com>
wrote:
>On Thursday 05 February 2009 16:03:52 Mitar wrote:
>> Hi!
>> 
>> On Thu, Feb 5, 2009 at 9:52 PM, slush <slush at slush.cz> wrote:
>> > Although Im big Tor fan, I think it is better idea to run Tor in unused
>> > bandwith (like me) on plenty of computers rather than pay together few big
>> > centralized servers (like you offer). Firstly, using unused bandwidth is for
>> > free. And it is also more secure.
>> 
>> I agree and this is also the way I am using "my" bandwidth.
>> 
>> But on the other hand I am seeing many e-mails like "I would like to
>> contribute to Tor but my ISP/university/mom does not allow me/has
>> blocked me/does not want to hassle". So maybe those could cooperate in
>> a way of putting together such nodes.
>
>I've sometimes wondered about the whether it would be possible to alter tor a bit, or place another app between tor and the net (perl script or something) that would work with a tor exit.  In cases where someone would like to run a tor exit node but gets into trouble with their ISP, might it be possible to add a script that might take at least the web traffic from a tor exit node in question and package it up and send it to anonymizer or kaxy or some other web anonymity proxy on the net?  It would be equivalent to adding a 4th, external node to the 3 official tor nodes...

     What you propose would qualify any exit doing it to receive a BADEXIT flag
from the directory authorities.  This kind of nonsense has been thoroughly
hashed out on this list in the past.
>
>This is a variation of a way I have considered for doing some extra anonymizing:  use tor to connect to a web anonymizing proxy and browse from there.
>
     tor is *already* an anonymizing proxy.  That is its *main purpose*.

>It would offload complaints about "inappropriate" acts by tor users away from the exit node and to the anonymizer service, which I am sure can take it because it is what they DO.

     Please go read the tor man page again.  Specifically, you should reread
the material on the ExitPolicy statement in the torrc file.  The proper way
to prevent exits on port 80 is to use an ExitPolicy that rejects port 80 for
whatever destination IP addresses the operator wishes to reject from port 80
exits.  It really is not very complicated in concept or difficult to do.
>
>-- 
>There is danger from all men. The only maxim of a free government ought to be to trust no man living with power to endanger the public liberty.
>- John Adams [1772]
>
     Well, *amen* to that!  Especially, given what our Congresscriminals
and Senilators are involved in today, namely, their theft of another several
hundred gigafedbucks from us for the benefit of their financially incompetent
and/or crooked friends in order to a) make sure the current depression gets
as deep as the Great Depression, and b) drag it out for an extra decade like
they did in the Great Depression, whose finale was America's involvement in
another world war, followed by another couple of years of depression.


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:       bennett at cs.niu.edu                              *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************



More information about the tor-talk mailing list