|
|
(2 intermediate revisions by one other user not shown) |
Line 1: |
Line 1: |
− | The mit.edu website listed in the readme of the plugin doesn't work. If you look in torblock.cpp, the plugin actually pulls data from [http://moria.seul.org:9032/tor/status/authority http://moria.seul.org:9032/tor/status/authority] so I changed the link to that.
| + | #REDIRECT [[Talk:Plug-ins]] |
− | [[User:Mets|Mets]] 17:46, 20 May 2008 (EDT) | + | |
− | | + | |
− | The current implementation blocks any IP-address mentioned in the above list.
| + | |
− | Looking at the list, you can find, that there are some nodes listed as 'Exit', and some are not. Perhaps the plug-in could be improved to make the choice to block some hosts more sensible.
| + | |
− | The plug-in could improve even more to only block nodes that actually have exit-policies that would allow to connect to the testing server.
| + | |
− | I prethee you to heed the information in the [https://www.torproject.org/faq-abuse.html.en Tor abuse FAQ].
| + | |
− | [[User:Aol|Aol]] 18:28, 3 January 2009 (EST)
| + | |
− | | + | |
− | Our stance has been, there is no need to use a proxy, PERIOD. Information is not harvested,etc. If you can't play from your actual address and need to be anonymous, then that is really your paranoia and you have to deal with it. I think we like the TOR block just the way it is. [[User:DonnyBaker|DonnyBaker]] 04:57, 4 January 2009 (EST)
| + | |