[tor-talk] Hijacking Advertising to give a Tor Exit node economic sustainability?

Fabio Pietrosanti (naif) lists at infosecurity.ch
Sun Aug 7 21:55:38 UTC 2011


On 8/7/11 10:02 PM, Jim wrote:
> IMNSHO, as far as "official discussion" (at least as "official" as this
> mailing list ;-) goes, the answer to the question of it being an
> acceptable idea dictates whether it even makes sense to consider
> spreadsheets.  Of course, doing any kind of arbitrary spreadsheet
> analysis, purely for private amusement, is up to the individual!

I made some brief analysis and it seems to be more complicated for the
following reasons:

a) Not all advertising is served with a dedicated DNS hostname

or example facebook serve it on http://facebook.com domain.

b) It's not easy to catch all URL and to modify content without breaking
everything

Implementing a transparent proxy server for exit traffic only, without
breaking tor traffic would require such feature we discussed some time
ago:
https://lists.torproject.org/pipermail/tor-talk/2011-March/thread.html#19765

However i am now making a 1 week collection of dns query and url requests.
After would check that lists against adzap and other ad filtering
software that include list of hostname, urls and pattern.

That way we can use an advertising blocking software to check how many
ad traffic was here.

So we will have some numbers, purely for private amusement, to be used
for calculation into a spreadsheet to be shared.

> 
> As far as I am concerned, if such hijacking did not immediately lead to
> bad exit designations, then Tor would no longer be suitable for anything
> w/o end-to-end encryption.  (Of course, some feel it already is
> unsuitable for clear text ... :-)

I do very often proposal that could lead to 'bad exit designations' :P

-naif


More information about the tor-talk mailing list