At 10:26 AM 8/10/2012 -0400, you wrote: >-------- Original Message -------- >> >> Date: Fri, 10 Aug 2012 02:00:39 +0300 >> From: Maxim Kammerer <m...@dee.su> >> >> Yes, if gathering .onion access statistics were possible, I would load >> each .onion address in a top-50 list and see what it contains, or >> search for the address if access requires authentication. The reason >> is that I am curious and don't have an agenda to protect, unlike Tor >> project policy people. Why do you pretend that it's difficult to do? > >It's not pretending that it's difficult to do. It is, in fact, difficult to >do just by the nature of how Tor functions. Even if you were logging >everything that came out of an exit node that you control, you wouldn't be >able to get good stats from that. You'd need a significant sampling of other >Tor exit nodes to do the same thing. It's a bit hard to accept that you don't >have an agenda to protect when you come in here asserting one of the most >demonizing talking points against Tor with nothing hard to back up your claims >other than "some guy on reddit said so."
This is probably a dumb question, so I apologize in advance. Controlling exit nodes doesn't allow people to know what's going on inside the .onion darknet? Or does it? >_______________________________________________ >tor-talk mailing list >tor-talk@lists.torproject.org >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk