Re: [tor-relays] Anonbox Project
On Fri, Oct 17, 2014 at 3:36 PM, Colin Mahns wrote: > It looks like Kickstarter has suspended the project. Some of this thread seems a bit silly. Tor does one thing, it anonymizes your IP address. These boxes push everything through that, which is generally exactly what you want... no leaks. So great, go sell a million of them. But some of this thread bashes the boxes for doing simply that. I say NO. If you want a teacher to handhold and teach you anything safe beyond how to be an anon IP address (which Tor and boxen already provide) ... such as system administration, session management, how to actually be contextually, network, and datawise anon... go kickstart a companion book on that. Don't just bash the boxen about not including such a book if you are not also willing to write the book... as the boxen exist to sell 'IP address anonymizers', not books. Chinese lookalikes, and best interaction with Tor network, are also separate subjects. To the latter which is relavent, Tor is becoming very popular, its fundamental design and ops need planned to be able to scale to many millions of clients, like yesterday perhaps. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Anonbox Project
It looks like Kickstarter has suspended the project. http://www.wired.com/2014/10/kickstarter-suspends-anonabox Colin On October 15, 2014 9:47:09 AM EDT, isis wrote: >Sven Reissmann transcribed 2.4K bytes: >> Hi there, >> >> I recently read about the anonbox project [1], a small >hardware-router, >> which allows end-users to connect their whole LAN to the Tor network. >> The project is on kickstarter at the moment [2]. >> >> Has there already been a discussion on how this might affect the >> performance of the Tor network? > >Yes and no. > >One of the Anonabox developers, August Germar, posted to their >kickstarter >page that the distributed Anonaboxes would have a checkout option to be >relays/bridges by default. [0] Colin Mahns responded to this, [1] >pointing out >some of my recent discussions with Mike Perry and others on the tor-dev >list >on scaling the Tor network. [2] [3] (And August Germar responded in >their >Reddit AMA. [4]) > >I agree with Colin that the Anonabox folks seem to be well-intentioned. >However, the network effects, were these routers to be distributed, and >were a >majority of them to be configured as relays by default, would likely be >harmful due to the low bandwidth of most residential connections. > >That said, I think that everyone here would welcome the chance for a >pocket-sized FLOSS router which enforces safe Tor usage. If that is >their >goal, and they are able to communicate honestly with users, I'd like to >help >them succeed. Particularly if it means someone else does hardware >development, >since that's not really my jam. :) > >[0]: >https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625 >[1]: >https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router/posts/1017625?cursor=8115567#comment-8115566 >[2]: >https://lists.torproject.org/pipermail/tor-dev/2014-September/007558.html >[3]: >https://lists.torproject.org/pipermail/tor-dev/2014-September/007560.html >[4]: >https://www.reddit.com/r/anonabox/comments/2ja22g/hi_im_august_germar_a_developer_for_the_anonabox/cl9u17k > >-- > ♥Ⓐ isis agora lovecruft >_ >OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35 >Current Keys: https://blog.patternsinthevoid.net/isis.txt > > > > >___ >tor-relays mailing list >tor-relays@lists.torproject.org >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays