Security, malware, viri--you've got to keep your eyes open
3 posts • Page 1 of 1
- Senior Member (Entitled To Root Beer)
- Posts: 529
- Joined: 01/08/02, 12:00 am
- Location: Indianapolis, IN
I do not think anything severe happened to the student, but a student at Rose-Hulman Institute of Technology had a Tor exit node and somebody used it for malicious purposes. I suspect the student did not have his node configured properly or something, but I am not sure what kind of configurations are available for a Tor node. See http://www.rose-hulman.edu/thorn/archiv ... age/1.html for the story in the school paper.
- BIG GIANT HEAD I Get Free Beer
- Posts: 2385
- Joined: 12/09/01, 12:00 am
- Location: USA
Weird. I've only heard of one other problem case with Tor, and it was in France. One thing you can do is limit the ports clients can use, how much bandwidth they get, etc. This is what I was doing when my server was running (back at univ now, so I can only use it as a client [evil firewall]). This guy apparently did that, but nothing is foolproof. One way would be to set it up as an intermediate node only, thus connections would be forwarded on to another node, thus hiding any of your own node's involvement.
Keep Your Assets & ID Private! Can you afford not to?