Re: Maximize Anonymity Services but Minimize 'Abuse Like' Behaviors...

2009-01-03 Thread Erik Heidt
Gregory and Ted - Thanks for sharing your ideas. The challenge here runs deep... At this time, I am measuring the 'effectiveness' of my contribution to Tor though the bandwidth that is used. In 2008, I had over a TBytes of bandwidth that I didn't use. (Purchased as a part of my server hosting

Maximize Anonymity Services but Minimize 'Abuse Like' Behaviors...

2009-01-02 Thread Erik Heidt
Tor Gurus - So, I have just started running a Tor Relay. Currently I am in operating in bridge mode, with a exit policy that rejects all. I am concerned about having to deal with DCMA or other complaints, but I want to balance that concern with providing real privacy value to the people who need

Re: Maximize Anonymity Services but Minimize 'Abuse Like' Behaviors...

2009-01-02 Thread Ted Smith
On Fri, 2009-01-02 at 11:43 -0500, Erik Heidt wrote: Tor Gurus - So, I have just started running a Tor Relay. Currently I am in operating in bridge mode, with a exit policy that rejects all. I am concerned about having to deal with DCMA or other complaints, but I want to balance that

Re: Maximize Anonymity Services but Minimize 'Abuse Like' Behaviors...

2009-01-02 Thread Gregory Maxwell
On Fri, Jan 2, 2009 at 11:43 AM, Erik Heidt erik.he...@artofinfosec.com wrote: [snip] - Permitting exit to key informational resources (e.g. wikipedia services) - Permitting exit to top 5 or 10 web mail services (e.g. google mail, hotmail, yahoo, etc.) And manage to make yourself look like