On Friday 27 May, 2011 08:10:47 tagnaq wrote: > You do not mention the threats you worry about and assets you care about > (thread model + security requirements).
Yes that's because I don't know what threats there may be. I am a user, I don't have an MS in Computer Science. For example I don't understand, "maps subnets and/or ports to inside. Separating traffic into VLANs. In general having a lot more control of the hardware layer." What good is this if users can't secure their own machine effectively? Why set up a relay if my own machine could be compromised? No wonder you have a hard time recruiting relays, much less exit points. I guess the coyness here is for some good reason, but it's not doing the cause any good. Looks like I have to give up on a relay. _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
