"In general, networks should be configured to deny access to websites such
as www.torproject.org"
Blocking Tor exit nodes is one thing, but this is just bizarre. They could
make a claim that privacy from your boss is something they wish to prevent,
but I saw no such claim.
On Thu, 27 Aug 2015 at
On 08/27/2015 12:51 AM, grarpamp wrote:
> http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF
>
> IBM Advises Businesses To Block Tor
>
> With Tor-based attacks on the rise, IBM says it's time to stop Tor in
> the enterprise.
>
> New data from IBM's X-Force research te
I couldn't find what they mean with "the Netherlands is home to the
largest number of non-malicious and malicious nodes combined" in
Figure 1 on page 8. What differentiate a "malicious node" from a
"non-malicious node"?
Otherwise it wasn't that bad, but the last paragraph is quite offensive:
"In
Hi. Sorry to bother you. You don't know me but I stumbled across your
tor-talk mailing list post regarding msmtp and tor hidden services
(https://lists.torproject.org/pipermail/tor-talk/2011-September/021411.html).
I know you wrote that in 2011, but I was wondering if you ever found a
solution to t
http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF
IBM Advises Businesses To Block Tor
With Tor-based attacks on the rise, IBM says it's time to stop Tor in
the enterprise.
New data from IBM's X-Force research team shows steady increase in SQL
injection and distributed