Re: [tor-talk] IBM says Block Tor

2015-08-26 Thread Virgil Griffith
"In general, networks should be configured to deny access to websites such as www.torproject.org" Blocking Tor exit nodes is one thing, but this is just bizarre. They could make a claim that privacy from your boss is something they wish to prevent, but I saw no such claim. On Thu, 27 Aug 2015 at

Re: [tor-talk] IBM says Block Tor

2015-08-26 Thread CJ
On 08/27/2015 12:51 AM, grarpamp wrote: > http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF > > IBM Advises Businesses To Block Tor > > With Tor-based attacks on the rise, IBM says it's time to stop Tor in > the enterprise. > > New data from IBM's X-Force research te

Re: [tor-talk] IBM says Block Tor

2015-08-26 Thread Anders Andersson
I couldn't find what they mean with "the Netherlands is home to the largest number of non-malicious and malicious nodes combined" in Figure 1 on page 8. What differentiate a "malicious node" from a "non-malicious node"? Otherwise it wasn't that bad, but the last paragraph is quite offensive: "In

[tor-talk] msmtp + tor hidden services

2015-08-26 Thread jago
Hi. Sorry to bother you. You don't know me but I stumbled across your tor-talk mailing list post regarding msmtp and tor hidden services (https://lists.torproject.org/pipermail/tor-talk/2011-September/021411.html). I know you wrote that in 2011, but I was wondering if you ever found a solution to t

[tor-talk] IBM says Block Tor

2015-08-26 Thread grarpamp
http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF IBM Advises Businesses To Block Tor With Tor-based attacks on the rise, IBM says it's time to stop Tor in the enterprise. New data from IBM's X-Force research team shows steady increase in SQL injection and distributed