On Wed, Jun 1, 2011 at 8:35 PM,  <cac...@quantum-sci.com> wrote:
> Although, until a Best Practices emerges for running a relay securely, I 
> won't be running a relay at all.  We went over this in detail here recently.

Hi all. I've been lurking here for some time but I may have missed
this conversation. Do you have a subject line for the relevant
thread(s)?

> The three methods I can think of have problems:
>
> - chroot jail can be broken by a skilled cracker.
> - VirtualBox VM bridged to LAN still must share the LAN class C, and could 
> potentially monitor internal traffic.  (And please don't quibble with me 
> calling it a class C... they have to make up a name and stick with it.  I 
> still call Nissan's a Datsun)
> - VPN to router, most routers do not have VPN functionality, only the 
> business-class like ProSafe.
>
> Until Best Practices are defined, many of us will be wary as we know what is 
> possible.

Thanks,
-- 
  Scott Elcomb
  @psema4 on Twitter / Identi.ca

  Atomic OS: Self Contained Microsystems
  http://code.google.com/p/atomos/

  Clerk of the Pirate Party of Canada
  http://www.pirateparty.ca/
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to