Delivery-Date: Thu, 05 Nov 2015 16:10:15 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1F97E1E039F
	for <archiver@seul.org>; Thu,  5 Nov 2015 16:10:14 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 6523437BEA;
	Thu,  5 Nov 2015 21:10:08 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 4716337BDD
 for <tor-talk@lists.torproject.org>; Thu,  5 Nov 2015 21:10:05 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id ljmV7bmM3bWm for <tor-talk@lists.torproject.org>;
 Thu,  5 Nov 2015 21:10:05 +0000 (UTC)
Received: from smarthost1.greenhost.nl (smarthost1.greenhost.nl
 [195.190.28.81]) (using TLSv1 with cipher AES256-SHA (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 1B1B737BB8
 for <tor-talk@lists.torproject.org>; Thu,  5 Nov 2015 21:10:05 +0000 (UTC)
Received: from smtp.greenhost.nl ([213.108.104.138])
 by smarthost1.greenhost.nl with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)
 (Exim 4.72) (envelope-from <lucas@codingrights.org>)
 id 1ZuRn9-0005nR-MP
 for tor-talk@lists.torproject.org; Thu, 05 Nov 2015 22:10:00 +0100
Message-ID: <563BC58B.6050901@codingrights.org>
Date: Thu, 05 Nov 2015 19:09:31 -0200
From: Lucas Teixeira <lucas@codingrights.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
 rv:31.0) Gecko/20100101 Icedove/31.8.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
X-Authenticated-As-Hash: 0f7b5b48b1898a35d139638a49277ef123befdec
X-Virus-Scanned: by clamav at smarthost1.samage.net
X-Scan-Signature: a350ae07b5350cdad28cef237d2e7179
Subject: [tor-talk] actions taken against bad nodes
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi,

First, thanks for everyone here. I've been following the list for some 2
months and getting even more trust in the Tor community. I've been doing
digital security trainings for quite a while, and I talk about Tor since
the beginning. Watching this list (and now tor-teachers too) has been
invaluable to learning both how Tor works and what people struggle with
the most (I've been doing my best for the "Tor is a tool of the US
empire" one).

I wonder what actions are taken when you encounter bad nodes -- those
who merely watch may be difficult to spot, but those who modify traffic
should be easy to detect e.g. with the OONI infrastructure.

Is there a mechanism in place to ban them from the network, are they
only banned when certain studies come up (such the "spoiled onions" one)
or nothing at all is done?

I realize that a good portion of those nodes are located on judicially
hard places, but I also wonder if in some jurisdictions it would be
possible to prosecute the owners of these nodes.

Thanks

-- 
Lucas Teixeira
https://antivigilancia.org
https://twitter.com/eletrorganico


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

