-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Andrew Lentvorski wrote: > Hmmmm, looks like it's time to start running TOR and encrypting all traffic.
Anyone here actually running Tor? I used to but haven't for a while. I think I will fire it back up. We really need to encourage the p2p nature of the net and anonymity. If enough people run Tor nodes it makes many kinds of net abuses more difficult. Sure, it enables certain other kinds of abuses but I consider those to be the lesser evil. > What this most likely means is that he was running A) unencrypted > BitTorrent to B) the default port on C) a very public tracker like > PirateBay and D) not running something like SafePeer in Azureus which > blocks access attempts from known RIAA/MPAA shills. Indeed. All of this stuff needs to be encrypted. I am still desperately awaiting freenet or i2p or some other such network to achieve usability. - -- Tracy R Reed Read my blog at http://ultraviolet.org Key fingerprint = D4A8 4860 535C ABF8 BA97 25A6 F4F2 1829 9615 02AD Non-GPG signed mail gets read only if I can find it among the spam. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iD8DBQFGBw/s9PIYKZYVAq0RAl2uAJsFMWGbVqmv9qG95y/vf1Sz0DTnawCdHL0j 3QkvTdEnXuVYJhyFN6hkHsg= =26MY -----END PGP SIGNATURE----- -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
