lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat Jun  3 06:08:26 2006
From: joeljose420 at gmail.com (Joel Jose)
Subject: blocking tor is not the right way forward. It may
	just be the right way backward.

its not just fair game. we had discussed it in tor irc chan. ok so you just
made a apache mod for the black list. tor always did and always do allow
anyone to block tor users if they please. but the easiness which tor gives
for the blocking must not be overused to deny tor communications even for
legitimate purposes(definition vague).

hopefully the blacklists, apache mods.. and other methods of blocking tor
are not "default" enabled. And hopefully the security cookbooks and other
HOWTO's dont come with a default recommendation to enable these tor blocking
modules.

The admin needs to be educated about tor. Ideally he must be able to decide
for himself the balance betrween anonimity and performance. He should be
empowered to take his own decision. An educated and well informed decision.
Remember " if privacy is outlawed, only outlaws will have privacy".. and
hackers have better ways to protect their privacy.. but as of today..
legitimate users dont have that luxury.. tor is thier most practical hope.

joel.

-- 
As soon as men decide that all means are permitted to fight an
evil, then their good becomes indistinguishable from the evil
that they set out to destroy.
                      - Christopher Dawson, The Judgment of Nations
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060603/22d2015a/attachment.html

Powered by blists - more mailing lists