Re: Rogue exit nodes - checking?

2010-06-20 Thread John M. Schanck
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 - -BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 On Sat, Jun 19, 2010 at 10:20:19PM +0100, Matthew wrote: I am curious to know if there is a way of identifying bad exit nodes? Do people who are more technical than me (not hard!) somehow

Re: Rogue exit nodes - checking?

2010-06-20 Thread John M. Schanck
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 - -BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 On Sun, Jun 20, 2010 at 11:58:45PM +0200, slush wrote: [snip] There are two ways how to fight attackers: a) Opensource scanner and beat them by spending months on scanner improvements. b)

Re: [GSoC] Improving Snakes on a Tor

2010-05-16 Thread John M. Schanck
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 On Sat, May 15, 2010 at 11:58:44PM -0400, Roger Dingledine wrote: On Sat, May 15, 2010 at 06:37:54PM -0700, Damian Johnson wrote: Hmmm... so we aren't interested in having a clearer definition of what makes up a bad exit? From the following

[GSoC] Improving Snakes on a Tor

2010-04-30 Thread John M. Schanck
Hi or-talk, My name is John Schanck, I'm a third year CS student at Hampshire College, and I'll be working with Tor this summer through Google Summer of Code. First, let me say how excited I am to have this opportunity - I've been following the Tor project for several years now and can think of no