lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4489982F.7070000@csuohio.edu>
Date: Fri Jun  9 16:48:12 2006
From: michael.holstein at csuohio.edu (Michael Holstein)
Subject: Re: blocking tor is not the right way forward.
	It may just be the right way backward.

> again, redirecting a tor user to a 403 requires you to sit and think up of
> a workaround. perhaps you aren't able to come up with one or you don't
> want to take the time/effort. this means i've effectively deterred you from
> using tor to get to the website. now if you care about the website more
> than your privacy, you'd not use tor. if you cared about privacy more,
> you'd not visit the site. you've been deterred from visiting the site
> anonymously. which means it worked. how many people will spend more
> time in order to visit the site?

As an avid supporter of TOR (and previous operator of a multi-megabit 
exit node), I do this all the time.

I'm going to be anonymous dammit, and I don't care what the other side 
thinks. The harder you try to keep us out, the harder we work to get 
around it. This is a technical battle you'll never win, because there 
are more idealists that believe in privacy than there are un-clued 
admins (and LEO) that think otherwise.

/mike.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ