{"id":170,"date":"2011-01-10T21:37:25","date_gmt":"2011-01-10T20:37:25","guid":{"rendered":"https:\/\/thebc.ch\/blog\/?p=170"},"modified":"2013-02-01T13:18:26","modified_gmt":"2013-02-01T12:18:26","slug":"tor-how-to-blacklist","status":"publish","type":"post","link":"https:\/\/thebc.ch\/blog\/?p=170","title":{"rendered":"Tor &#8211; How to blacklist"},"content":{"rendered":"<p>Tor <a title=\"http:\/\/tor.eff.org\/\" rel=\"nofollow\" href=\"http:\/\/tor.eff.org\/\">An anonymous Internet communication system<\/a> is used to surf quiet anonymously through the net. Because of it&#8217;s  anonymity it is also abused for illegal activity. Below you will find  information about how you can denied access from Tor to your site and  why this would be security by obscurity.<\/p>\n<p>You can block access from Tor to your site based on a list whith known Tor &#8220;Supernodes&#8221; available at:<\/p>\n<p><a title=\"http:\/\/serifos.eecs.harvard.edu\/cgi-bin\/exit.pl?sortbw=1&amp;addr=1&amp;textonly=1\" rel=\"nofollow\" href=\"http:\/\/serifos.eecs.harvard.edu\/cgi-bin\/exit.pl?sortbw=1&amp;addr=1&amp;textonly=1\">http:\/\/serifos.eecs.harvard.edu\/cgi-bin\/exit.pl?sortbw=1&amp;addr=1&amp;textonly=1<\/a><\/p>\n<p><a title=\"http:\/\/www.ahbl.org\/docs\/torbl.php\" rel=\"nofollow\" href=\"http:\/\/www.ahbl.org\/docs\/torbl.php\">http:\/\/www.ahbl.org\/docs\/torbl.php<\/a><\/p>\n<p>Here you will find ways how to get around such limitations: <a title=\"http:\/\/wiki.noreply.org\/noreply\/TheOnionRouter\/TorifyHOWTO#head-bbc4ee58b36fa00aec7be6bc4bf19ddb86ba10b9\" rel=\"nofollow\" href=\"http:\/\/wiki.noreply.org\/noreply\/TheOnionRouter\/TorifyHOWTO#head-bbc4ee58b36fa00aec7be6bc4bf19ddb86ba10b9\">http:\/\/wiki.noreply.org\/noreply\/TheOnionRouter\/TorifyHOWTO#head-bbc4ee58b36fa00aec7be6bc4bf19ddb86ba10b9<\/a><\/p>\n<p>As you can see&#8230; it&#8217;s security by obscurity. Better use the time to secure your webserver than to block such traffic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tor An anonymous Internet communication system is used to surf quiet anonymously through the net. Because of it&#8217;s anonymity it is also abused for illegal activity. Below you will find information about how you can denied access from Tor to &hellip; <a href=\"https:\/\/thebc.ch\/blog\/?p=170\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-170","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=170"}],"version-history":[{"count":4,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions"}],"predecessor-version":[{"id":2743,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions\/2743"}],"wp:attachment":[{"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thebc.ch\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}