I'd imagine it is quite easy for a lot of these providers to have a
pre-configured virtual machine template or cd image that they can deploy
across the board amongst a plethora of different VPS solutions as well.
Being able to bring up exit points on the fly would be very helpful in
bypassing censorship.

On Wed, Jun 10, 2015 at 12:39 PM Bacon Zombie <baconzom...@gmail.com> wrote:

> Well if they are using Hola then EVERY person with it installed is an
> exit-node.
>
> http://adios-hola.org
>
>
> https://m.reddit.com/r/netsec/comments/37rit3/adios_hola_why_you_should_immediately_uninstall/
> On 10 Jun 2015 14:28, "Jared Mauch" <ja...@puck.nether.net> wrote:
>
> >
> > > On Jun 10, 2015, at 8:08 AM, Roland Dobbins <rdobb...@arbor.net>
> wrote:
> > >
> > >
> > > On 10 Jun 2015, at 18:56, John Levine wrote:
> > >
> > >> I presume there is no need to explain why this would be of interest.
> > >
> > > To keep consumers who've legitimately purchased/rented/subscribed to
> > content from accessing same when they travel internationally?
> > >
> > > Because as a regular international traveler, that's what springs to
> mind
> > when I see requests like this.
> > >
> > > Another thought is governmentally-driven censorship, something else I
> > encounter a lot in my travels.
> >
> > I’ll just simplify this and say that the Tor Project publishes a list of
> > its exit nodes so you can block these if your abuse/fraud requirements
> > necessitate this.
> >
> > https://check.torproject.org/cgi-bin/TorBulkExitList.py
> >
> > If it’s for geolocation blocking, I’m in favor of these political
> > limitations to go away.  It doesn’t take a genius to bypass these if
> that’s
> > your intent.
> >
> > - Jared
>

Reply via email to