It’s not a threat model issue. It’s more of a let’s make Tor less dependent on 
a few public resolvers. Running our own resolvers just makes more sense at such 
a scale.

Cordially,
Nathaniel Suchy (they/them)

Sent from ProtonMail Mobile

On Thu, Mar 5, 2020 at 1:59 AM, Alec Muffett <[email protected]> wrote:

> Hey Nathaniel,
>
> What's your threat model here? What would you want to achieve?
>
> On Wed, 4 Mar 2020, 17:24 Nathaniel Suchy, <[email protected]> 
> wrote:
>
>> There has been discussion over the past several years that the Tor network 
>> should not use public DNS resolver as it has security implications on the 
>> Tor network 
>> (https://medium.com/@nusenu/who-controls-tors-dns-traffic-a74a7632e8ca). 
>> Should new Tor Exit Relays be probed and not included in the consensus until 
>> they're running their own DNS resolver and not relying on a public one?
>> _______________________________________________
>> tor-relays mailing list
>> [email protected]
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Attachment: publicKey - [email protected] - 556d8844.asc
Description: application/pgp-keys

_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to