Silk Road forums
Discussion => Off topic => Topic started by: zingzong on April 30, 2012, 03:47 am
-
http://xqz3u5drneuzhaeo.onion/users/badtornodes/
sup? any better methods? info about this?
-
bump, maybe this should have been in the security forums?
-
I am not sure if there are any better methods, short of going through each node yourself, but this list is pretty good. There are a lot of known bad nodes, as well as nodes with strange exit policies, and long time outs. Not to mention the nodes that belong to [NSA? FBI?] the set of computers on the same IP chain in D.C. . The only worry that I see is that maybe it isn't updated enough, BUT if you follow basic security measures, you will be fine.
-
you shouldn't use this list, let Tor pick nodes for you, they already mark bad nodes at the authority servers and your client will not select nodes with the 'bad' flag.
-
you shouldn't use this list, let Tor pick nodes for you, they already mark bad nodes at the authority servers and your client will not select nodes with the 'bad' flag.
They do not mark all the bad nodes, and there are plenty that are suspect as well. It is a good precaution for those that like a bit of extra saftey. As for me, I always go for overkill. Beyond secure, bordering on tin-foil hat ;D
-
You can bet your ass LE has Tor honeypots.
I would also be wary of nodes that have extremely low latency and fast connections.
Use hidden services whenever possible, and if not possible, use encryption.