-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 It is dangerous. I've run a cluster of exits for a long time and people like myself and Moritz know the dangers of reducing the diversity pool. Adding even a gigabit of exits to a single AS right now is dangerous and I've consulted arma on the topic before who agreed. Beyond 25% of the network is dangerous and higher than that could cause serious anonymity implications.
As a correction too, you do not control 90% of the exit BW, you have a potential of approximately that. If, what I only really described as a Sybil attack continues (I can't judge if it is malicious as there is no evidence of that to my knowledge), it will harm the Tor network and it does run the risk of getting a BadExit flag. Also, if you want to contribute to Tor you are welcome to ask what to do. Coming in, firing up huge B/W potential exits without blocking certain ports and then associating it as a positive sign is to misunderstand why the network is secure and can be very detrimental to our cause. We can cope with double the bandwidth before those nodes came online and we can certainly scale - me and Moritz, as well as other groups who work on Tor in various ways do have plans should this ever be required even on short notice. By the way, I am not going to say exactly what it is on the mailing list, but you've had an opsec facepalm on those relays and it can't be removed once submitted to Onionoo and the other metric systems, but at this point I imagine the FBI have already got a clone of all that data anyway. As most of you are based in the US, you are already fucked so you better get cleaning those hard drives and lawyer up buddy. The tough persona doesn't work for "hacking" groups. Journalists - use private emails please, this list isn't open game for your requests and if you are asking for a Skype interview, you need to go back to journalism 101 on protecting your sources. - -T [email protected]: > Why? I assure you, our exits are just fine. What's with people > responding so negatively to us donating 360Gbit/s of exit BW? >> On 2014-12-26 11:43, Justaguy wrote: >>> what should happen to these all >> Slap 'em all with BadExit flags? -- tor-talk mailing list - >> [email protected] To unsubscribe or change other >> settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >> > > - -- Activist, anarchist and a bit of a dreamer. PGP Keys: key.thecthulhu.com Current Fingerprint: E771 BE69 4696 F742 DB94 AA8C 5C2A 8C5A 0CCA 4983 Key-ID: 0CCA4983 Master Fingerprint: DDEF AB9B 1962 5D09 4264 2558 1F23 39B7 EF10 09F0 Key-ID: EF1009F0 Twitter: @CthulhuSec XMPP: thecthulhu at jabber.ccc.de XMPP-OTR: 4321B19F A9A3462C FE64BAC7 294C8A7E A53CC966 -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJUna6EAAoJEFwqjFoMykmDOiAP/2R37J1MRRl8FTq3AcP+MS8w WfcaSmNLntflqhArZI+m0fpT/d2cp0/0CEesN5N5fWEm1PKvlADQhu/2yAh+IFGk OtlT0Nd2KDnLmRPFWYTbtzL5JQJ3MFD0ZUFYfVVbP7XQaehV8eNgoMySSbGPgGef xSbZqqGOTXucKJ9NGBPDhl2tbKdgDYcZy+7riPnWwvfCjFUT4eK3XvVcYXQNLER/ QeqvXRK2m+W41Fg1HPWAyilnW/YzEtcfleRrkF9Pu1lJG4tdxDjTnVikpwX39mFl bKL9R2Nw4VpgTGX2173+PmE9rck5+o+HxG47si+gwWAmDQ+kTAi8sln2U2EvW7c2 kIukuyl/s41I5/eliSzXW7CQyxqGfJRfe0Th1i5DIIgKRDcxHNjAxvxEiysUfP79 t9VJuL+7pENm4hki+ClK7S/jN5zdwgAMlLSiEF4wfOWNEIQwP4EijGsq4bROTGMY 32yqYQwA3WPARtVuW2NDVFFcUiuHfSTvrlZ+DTu+y5p15+MC0krWVfMhQcS80D86 IXEGnGpR8qXpGkdP/53HhXWfNnvbFmqevK7dn1OwXlP8XFY8hc/ZocDL19+HmP6G +rNbwx52w3+gb+2fT9vHaEFVFnLudz1q4IKxsjsyg84qaT466254nnWUMsoBQOc8 5EKfusHRBJamSo5XyLpz =XcoB -----END PGP SIGNATURE----- -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
