lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue Jun 6 01:43:32 2006 From: mz4ph0d at gmail.com (mz4ph0d@...il.com) Subject: Tool Release - Tor Blocker On 06/06/2006, at 3:38 AM, Aaron Turner wrote: > Your module doesn't actually make a determination between "malicious" > and "legitimate" users of tor. From where I come from, we call this > "throwing the baby out with the bath water". Agreed, but it's his server, shouldn't he be able to throw out whatever babies he wants? Should corporate networks not block all IPs outside of the ones they want authorized if they want to? If the reward of restricting Tor access is greater than the risk of leaving it open, he can and should block whatever he damn well pleases. And despite what some people seem to be eluding to in this thread, that doesn't threaten your right to privacy one bit. Can't access the site anonymously? Go somewhere you can. Problem solved. Z.
Powered by blists - more mailing lists