Re: [tor-dev] Hidden service policies

2014-12-29 Thread grarpamp
I've blocked Mike's known nodes from my configs as I simply do not agree with his apparent ethos in this regard. That being themes of censorship, policing, etc. It's better individuals decide for themselves, or upon peer input, than upon hard forms of tracking prevail. There is a lot of oppurtunity

Re: [tor-dev] Hidden service policies

2014-07-23 Thread Mike Hearn
> > (Aside: I think this thread is unrelated enough to tor-dev at this point > that I'm going to make this my last reply.) > That's too bad - I was only answering questions you posed yourself. Happy to continue debating off list. Still, I think discussion of features that could increase usage are

Re: [tor-dev] Hidden service policies

2014-07-22 Thread Ted Smith
(Aside: I think this thread is unrelated enough to tor-dev at this point that I'm going to make this my last reply.) On Tue, 2014-07-22 at 14:42 +0200, Mike Hearn wrote: > Regardless of the moral arguments you put forward, which I > will not > comment on, it seems like this

Re: [tor-dev] Hidden service policies

2014-07-22 Thread Mike Hearn
> > Regardless of the moral arguments you put forward, which I will not > comment on, it seems like this idea would never be implemented because > none of the Tor developers have a desire to implement such a dangerous > feature. > I can argue that the lack of it is also dangerous, actually. It amo

Re: [tor-dev] Hidden service policies

2014-07-21 Thread Ted Smith
On Mon, 2014-07-21 at 11:48 +0200, Mike Hearn wrote: > One of my first concerns would be that this would build in a > very easy > way for a government (probably the US government) to compel > Tor to add > in a line of code that says "If it's this hidden servi

Re: [tor-dev] Hidden service policies

2014-07-21 Thread Moritz Bartl
On 07/21/2014 12:34 AM, Mike Hearn wrote: > Tor provides exit policies to let exit relay operators restrict traffic > they consider to be unwanted or abusive. In this way a kind of > international group consensus emerges about what is and is not > acceptable usage of Tor. For instance, SMTP out is

Re: [tor-dev] Hidden service policies

2014-07-21 Thread Mike Hearn
> > This isn't about 'acceptable usage of Tor', this is necessary compromise > to limit exit operators' exposure to ISP harrassment. > Even if we accept your premise that no exit operator cares about internet abuse, it's still the same thing. ISP's define what is acceptable usage of their internet

Re: [tor-dev] Hidden service policies

2014-07-21 Thread Mike Hearn
> > One of my first concerns would be that this would build in a very easy > way for a government (probably the US government) to compel Tor to add > in a line of code that says "If it's this hidden service key, block > access." > And people who run Tor could easily take it out again, what with it

Re: [tor-dev] Hidden service policies

2014-07-20 Thread grarpamp
On Sun, Jul 20, 2014 at 6:34 PM, Mike Hearn wrote: > Hello, > > As we know, hidden services can be useful for all kinds of legitimate things > (Pond's usage is particularly interesting), however they do also sometimes > get used by botnets and other problematic things. > > Tor provides exit polici

Re: [tor-dev] Hidden service policies

2014-07-20 Thread Tom Ritter
One of my first concerns would be that this would build in a very easy way for a government (probably the US government) to compel Tor to add in a line of code that says "If it's this hidden service key, block access." After all - it's a stretch to say "You must modify your software to support blo

Re: [tor-dev] Hidden service policies

2014-07-20 Thread Andrea Shepard
On Mon, Jul 21, 2014 at 12:34:50AM +0200, Mike Hearn wrote: > Hello, > > As we know, hidden services can be useful for all kinds of legitimate > things (Pond's usage is particularly interesting), however they do also > sometimes get used by botnets and other problematic things. > > Tor provides e

[tor-dev] Hidden service policies

2014-07-20 Thread Mike Hearn
Hello, As we know, hidden services can be useful for all kinds of legitimate things (Pond's usage is particularly interesting), however they do also sometimes get used by botnets and other problematic things. Tor provides exit policies to let exit relay operators restrict traffic they consider to