[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <44847E69.6050305@onda.com.br>
Date: Mon Jun 5 19:57:12 2006
From: linux-fan at onda.com.br (Giancarlo Razzolini)
Subject: Tool Release - Tor Blocker
Seems to me more like security through obscurity. If a hacker own some
other machine, he/she can use tor to get to that machine, and then,
access your vulnerable webserver. Not even to mention that even if the
hacker is a lame one, and "hack" you application from another country,
it's WAY more difficult to prosecute then. I do use tor for legitimate
applications, and it seems that you won't get much friends blocking it.
In the tor faq, there is also an explanation of how to circumvent this
kind of blocking:
http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#head-bbc4ee58b36fa00aec7be6bc4bf19ddb86ba10b9
My 2 cents,
--
Giancarlo Razzolini
Linux User 172199
Moleque Sem Conteudo Numero #002
Slackware Current
OpenBSD Stable
Snike Tecnologia em Inform?tica
4386 2A6F FFD4 4D5F 5842 6EA0 7ABE BBAB 9C0E 6B85
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: OpenPGP digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060605/2fc09cbc/signature.bin
Powered by blists - more mailing lists