On Wed, Jun 1, 2011 at 8:35 PM, <cac...@quantum-sci.com> wrote: > Although, until a Best Practices emerges for running a relay securely, I > won't be running a relay at all. We went over this in detail here recently.
Hi all. I've been lurking here for some time but I may have missed this conversation. Do you have a subject line for the relevant thread(s)? > The three methods I can think of have problems: > > - chroot jail can be broken by a skilled cracker. > - VirtualBox VM bridged to LAN still must share the LAN class C, and could > potentially monitor internal traffic. (And please don't quibble with me > calling it a class C... they have to make up a name and stick with it. I > still call Nissan's a Datsun) > - VPN to router, most routers do not have VPN functionality, only the > business-class like ProSafe. > > Until Best Practices are defined, many of us will be wary as we know what is > possible. Thanks, -- Scott Elcomb @psema4 on Twitter / Identi.ca Atomic OS: Self Contained Microsystems http://code.google.com/p/atomos/ Clerk of the Pirate Party of Canada http://www.pirateparty.ca/ _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk