Thus spake Fergie ([EMAIL PROTECTED]): > Hmmm. > > http://blogs.zdnet.com/security/?p=114 > > Comments?
Will they write a ZDnet article about me when my node scanner starts to delist his compromised exit nodes? ;) There's of course no way that these nodes can be allowed to continue to be exits if discovered. Any of them can be retooled into targeting a lot more than just pedophiles, for fun, profit, or via subpoena. He's also putting himself in an interesting position here wrt federal wiretap law as well (as mentioned on the Tor legal faq). Though of course, he picked a good target to pick on. The anonymous typically have little legal recourse. Especially when you claim they all just want child porn. Of course, anyone utilizing common Tor best practices will not be affected by this. (Though the one gripe I have is that NoScript allows Java if you allow scripts.. But there are also extensions that block Java globally - like QuickJava). At any rate, I welcome a good open source implementation of this. If nothing else, it will be nice to pit it against my scanner on a test network to make sure this sort of thing can be reliably detected. As an aside, it's recently become clear that a lot of people are using these Internets things to transmit child pornography. Perhaps we should just shut 'er down? Sure would be easier than actually finding the PRODUCERS of such content... -- Mike Perry Mad Computer Scientist fscked.org evil labs

