-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
- -BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
On Sat, Jun 19, 2010 at 10:20:19PM +0100, Matthew wrote:
I am curious to know if there is a way of identifying bad exit
nodes? Do people who are more technical than me (not hard!) somehow
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
- -BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
On Sun, Jun 20, 2010 at 11:58:45PM +0200, slush wrote:
[snip]
There are two ways how to fight attackers:
a) Opensource scanner and beat them by spending months on scanner
improvements.
b)
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
On Sat, May 15, 2010 at 11:58:44PM -0400, Roger Dingledine wrote:
On Sat, May 15, 2010 at 06:37:54PM -0700, Damian Johnson wrote:
Hmmm... so we aren't interested in having a clearer definition of what makes
up a bad exit? From the following
Hi or-talk,
My name is John Schanck, I'm a third year CS student at Hampshire College,
and I'll be working with Tor this summer through Google Summer of Code.
First, let me say how excited I am to have this opportunity - I've been
following the Tor project for several years now and can think of no
4 matches
Mail list logo