At 10:26 AM 8/10/2012 -0400, you wrote:
>-------- Original Message --------
>> 
>> Date: Fri, 10 Aug 2012 02:00:39 +0300
>> From: Maxim Kammerer <m...@dee.su>
>> 
>> Yes, if gathering .onion access statistics were possible, I would load
>> each .onion address in a top-50 list and see what it contains, or
>> search for the address if access requires authentication. The reason
>> is that I am curious and don't have an agenda to protect, unlike Tor
>> project policy people. Why do you pretend that it's difficult to do?
>
>It's not pretending that it's difficult to do.  It is, in fact, difficult to 
>do just by the nature of how Tor functions.  Even if you were logging 
>everything that came out of an exit node that you control, you wouldn't be 
>able to get good stats from that.  You'd need a significant sampling of other 
>Tor exit nodes to do the same thing.  It's a bit hard to accept that you don't 
>have an agenda to protect when you come in here asserting one of the most 
>demonizing talking points against Tor with nothing hard to back up your claims 
>other than "some guy on reddit said so."


        
        This is probably a dumb question, so I apologize in advance.

        Controlling exit nodes doesn't allow people to know what's going on 
inside the .onion darknet? Or does it?
        
        






>_______________________________________________
>tor-talk mailing list
>tor-talk@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk 

_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to