Seems to me more like security through obscurity. If a hacker own some other machine, he/she can use tor to get to that machine, and then, access your vulnerable webserver. Not even to mention that even if the hacker is a lame one, and "hack" you application from another country, it's WAY more difficult to prosecute then. I do use tor for legitimate applications, and it seems that you won't get much friends blocking it. In the tor faq, there is also an explanation of how to circumvent this kind of blocking:
http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#head-bbc4ee58b36fa00aec7be6bc4bf19ddb86ba10b9 My 2 cents, -- Giancarlo Razzolini Linux User 172199 Moleque Sem Conteudo Numero #002 Slackware Current OpenBSD Stable Snike Tecnologia em Informática 4386 2A6F FFD4 4D5F 5842 6EA0 7ABE BBAB 9C0E 6B85
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
