We've had discussions about using anonymity software on the nodes before. One of the major reasons for it is to protect the node owners liability (eg. if one of their users abuses the system they can't get in trouble for it). However since we also want to build a reliable and scalable solution it means we need a way of removing abusive patterns of use, as you can imagine this has the potential to get pretty tricky. One good solution is ExtrusionDetection (or Reverse IntrusionDetection), the big problem we have with that right now is that there's no central aggregation point where an ExtrusionDetection box could go and most of the leaf nodes are either commercial AccessPoints or old hardware like FreeGeek boxes, neither of which have enough CPU power to run something like snort.

Here's a list of some software that might be interesting.


AnonymitySoftware (last edited 2007-11-23 18:00:53 by localhost)