21 Jun
2006
21 Jun
'06
9:08 p.m.
On 6/21/06, Kevin Day <toasty@dragondata.com> wrote:
Failing that, having an exit node look at HTTP headers back from the server that contained a "X-No-Anonymous" header to say that the host at that IP shouldn't allow Tor to use it would work.
What's to stop one or more exit node operators from hacking such a check right back out of the code? This is a better idea, but still has a bit of defeats-the-whole-point to it, as it would depend on people obeying that header voluntarily. Social vs. technological divide, again. -- -- Todd Vierling <tv@duh.org> <tv@pobox.com> <todd@vierling.name>