CCC dirserver gone

2006-09-10 Thread Marco A. Calamari

It' seems to me that CCC dirserver disappeared from
 serifos stats.

Is this connected with the German busting ?

BTW I think that few lines of summary of assested facts  reaction
 of bistong posted here can really be useful, not only for info but
 for the peace of mind of Tor exit node admins too.

Thanks.   Marco

-- 

+--- http://www.winstonsmith.info ---+
| il Progetto Winston Smith: scolleghiamo il Grande Fratello |
| the Winston Smith Project: unplug the Big Brother  |
| Marco A. Calamari [EMAIL PROTECTED]  http://www.marcoc.it   |
| DSS/DH:  8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B |
+ PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 --+



signature.asc
Description: This is a digitally signed message part


An observation

2006-09-10 Thread glymr
This incident in germany just highlights something which I think that I
would like to raise to the forefront of the tor community's mind, and in
fact perhaps this would be well advanced in the entire open source
community as a whole.

This is a war. We are fighting at the highest level, and this project
itself represents the ultimate counterattack to surveillance, and
surveillance being the highest level of military strategic processes.

All i want to say, after that sort of heavy statement is: tor server
operators should not expect to be free of injury from this battle we all
are engaged in.

Having said that, it is a war worth fighting.

We are fighting on the side of peace. Our cause is in the name of the
defeat of all methods of fighting war at the top level. If they cannot
surveil the enemy, they cannot establish adequate strategy. This means
any potential warmonger. It does not matter what you think your ideology
is, tor is at the top of the heap of defensive weapons. The more
citizens chose to adopt this defense the less capability any military
organisation has of determining a strategy. Without an effective stategy
they will not chose the right course of action and the wrong course of
action in military strategy leads to political disgrace.


Yes, it makes tor a political target. But we all knew that it would be,
and here is proof.

Don't take it lightly. Tor is not just idealism, it is offensive to the
most central power of oppression. It is ironic that this all emerged
from the most submerged of military cultures, ultimately, but they put
it out there, the people who started this obviously realised what they
were doing.

There is nothing more powerful in war than evasion. Surrender is weak
compared to running away. If you can remain out of the crosshairs, you
live to fight another day. Fostering this technology is helping people
escape.

I salute you!

:)


Re: CCC dirserver gone

2006-09-10 Thread BlueStar88




I would say: up and running

router chaoscomputerclub 80.237.206.93 9001 0 9030
platform Tor 0.1.1.23 on FreeBSD i386
published 2006-09-09 17:15:12


Marco A. Calamari schrieb:

  It' seems to me that CCC dirserver disappeared from
 serifos stats.

Is this connected with the German busting ?

BTW I think that few lines of summary of assested facts  reaction
 of bistong posted here can really be useful, not only for info but
 for the peace of mind of Tor exit node admins too.

Thanks.   Marco

  






signature.asc
Description: OpenPGP digital signature


Re: CCC dirserver gone

2006-09-10 Thread glymr
hehe

i was so emphatic! anyway, it still is valid what i said

but if i'd realised that CCC meant the chaos computer club i'd have said
'oh wait, i saw that one in my vidalia network viewer app just this morning'

BlueStar88 wrote:
 I would say: up and running
 
 router chaoscomputerclub 80.237.206.93 9001 0 *9030*
 platform Tor 0.1.1.23 on FreeBSD i386
 published 2006-09-09 17:15:12
 
 
 
 Marco A. Calamari schrieb:
 It' seems to me that CCC dirserver disappeared from
  serifos stats.

 Is this connected with the German busting ?

 BTW I think that few lines of summary of assested facts  reaction
  of bistong posted here can really be useful, not only for info but
  for the peace of mind of Tor exit node admins too.

 Thanks.   Marco

   
 


Re: CCC dirserver gone

2006-09-10 Thread Marco A. Calamari
On Sun, 2006-09-10 at 13:21 +0200, BlueStar88 wrote:
 I would say: up and running

I repeat - CCC *dirserver* 

The router is just fine, and on 9030 it still giving directory
 informations as router, but is no more authoritative
 following serifos stats (dirserver are marked in red)

I would be happy being wrong 

 
 router chaoscomputerclub 80.237.206.93 9001 0 9030
 platform Tor 0.1.1.23 on FreeBSD i386
 published 2006-09-09 17:15:12
 
 
 Marco A. Calamari schrieb: 
  It' seems to me that CCC dirserver disappeared from
   serifos stats.
  
  Is this connected with the German busting ?
  
  BTW I think that few lines of summary of assested facts  reaction
   of bistong posted here can really be useful, not only for info but
   for the peace of mind of Tor exit node admins too.

-- 

+--- http://www.winstonsmith.info ---+
| il Progetto Winston Smith: scolleghiamo il Grande Fratello |
| the Winston Smith Project: unplug the Big Brother  |
| Marco A. Calamari [EMAIL PROTECTED]  http://www.marcoc.it   |
| DSS/DH:  8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B |
+ PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 --+



signature.asc
Description: This is a digitally signed message part


Re: CCC dirserver gone

2006-09-10 Thread BlueStar88




CCC is no authority server and it was not

    http://node2.xenobite.eu/torstat.php

the first five green are authority server


Greets


Marco A. Calamari schrieb:

  On Sun, 2006-09-10 at 13:21 +0200, BlueStar88 wrote:
  
  
I would say: up and running

  
  
I repeat - CCC *dirserver* 

The router is just fine, and on 9030 it still giving directory
 informations as router, but is no more authoritative
 following serifos stats (dirserver are marked in red)

I would be happy being wrong 

  
  
router chaoscomputerclub 80.237.206.93 9001 0 9030
platform Tor 0.1.1.23 on FreeBSD i386
published 2006-09-09 17:15:12


Marco A. Calamari schrieb: 


  It' seems to me that CCC dirserver disappeared from
 serifos stats.

Is this connected with the German busting ?

BTW I think that few lines of summary of assested facts  reaction
 of bistong posted here can really be useful, not only for info but
 for the peace of mind of Tor exit node admins too.
  

  
  
  






signature.asc
Description: OpenPGP digital signature


Re: torstat (bold?)

2006-09-10 Thread BlueStar88
Order by country is already given. Use CC-Button (CountryCode).
Bold Nicknames are registered (named) nodes at Tor26 authority node.

Clickable node information is planned too, but the current state is the
first step to gain easy access to the node *status flag* information.
Try http://serifos.eecs.harvard.edu/cgi-bin/exit.pl for bandwidth and
further node informations.

The script is open, if i have incorporated more features like
bandwidth-information, authority-comparision, node-id/name/flag-history
(trackback) and so on..


Greets



numE schrieb:
 Hi,

 some nodes are printed in bold letters.
 i cant find any description what bold means.

 suggestion:
 it would be nice to order by country, too.

 i'd really like to host this script, too.
 will you open the source in the near future? :-)

 greetings.



   




signature.asc
Description: OpenPGP digital signature


Re: CCC dirserver gone

2006-09-10 Thread Roger Dingledine
On Sun, Sep 10, 2006 at 04:12:43PM +0200, Marco A. Calamari wrote:
 I repeat - CCC *dirserver* 
 
 The router is just fine, and on 9030 it still giving directory
  informations as router, but is no more authoritative
  following serifos stats (dirserver are marked in red)

Hi Marco,

We've had five directory authorities the whole time. I've been meaning
one day to add a CCC node as the sixth, and your node as the seventh,
but haven't gotten around to it yet. So don't be too worried yet.

In other news, I think this shows us that we probably want another
requirement on being a directory authority: must not be an exit node.

That is, we should avoid having more than one reason why somebody might
want to attack a directory authority.

--Roger



Re: Tor Defense Fund...an idea.

2006-09-10 Thread Andrew Del Vecchio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

This may be a good idea to contemplate, Anthony. I know of many
successful action organizations, including some I've worked for/with
directly that had such set-ups. Does anyone here have legal knowledge
specific to this realm of affairs? I myself am not a trial lawyer, so
I don't know the pros/cons of this directly. On the other hand, I am
an expert on legal and non legal related privacy and asset protection
solutions.
If done correctly, one can conceal one's ownership of property
(finances, physical property like house/car, etc) and hide most
economic transactions from the Databases-of-Doom. Fellow ExitNode
operators should check out http://www.mpassetprotection.com/ and read
the Asset Protection Crash Course.
The bottom line here is that if the self-proclaimed authorities
can't find/don't know you own anything of value in the first place,
they're much less likely to seek you out as the next great example
to be held up and publically beaten to scare the public
(metaphorically speaking). It's worked for several years for me and
longer for many others, so covering your legal-financial ass is very
affordable insurance when standing up to the welfare/warfare/police state.
Mr. Georgeo, I think we may have something here with the idea of a
two-pronged legal defense:
A. On the front-end, a good regimen of preventative care
privacy/asset protection best practices should be encouraged amongst
Tor users, especially server/router owners. This will nip most
seizures and lawsuits in the bud before they start in most cases.
B. For those rare exceptions when someone slips up and/or the men
with guns happen to get lucky through sheer statistics, we'll need a
way to fight back using the judicial system. I'm sure many of us are
already EFF members (I know I am at least), but going forward, the
EFF's legal burden may consist of Tor related lawsuits to a greater
extent. We already know that Germany and France have labeled operators
Child Porn ringleaders already, and something similar has happened
to a student at a US university relating to computer crime. As anyone
know pays attention to world politics knows, the US and all other
national governments have the bad habbit of picking up on their peers'
worst habbits. Anything to usurp more power... I mean spread democracy
and/or fight the war on terror/porn/[made up issue X], right?

What are your thoughts?

~Andrew

- --
Frivolous lawsuits. Unlawful government seizures. It's a scary world
out there!
Protect your privacy, keep what you earn, and even earn more income at:
http://www.KeepYourAssets.net/?andrew

Anothony Georgeo wrote:
 Hi,

 Tor server operators are more frequently subject to government
 action due to the fact they are running an exit or entry node.  IMO
  this will cause some operators to shutdown their nodes to avoid
 legal repercussions and/or the monetary damages that can be
 incurred (from fines or legal defense).

 I propose a fund (eg. Tor Defense Fund) that would be available
 to server operators engaged in legal battles.  The TDF would be
 funded by donations from other Tor users, as it would be in  their
 best interest to donate if they wish to keep the Tor network
 running well.

 Maybe the EFF would consider running the fund and paying out X
 amount of dollars to each operator who meets a certain criteria?

 Comments?

 Anogeorgeo


 --
  Get your email and more, right on the new Yahoo.com
 http://us.rd.yahoo.com/evt=42973/*http://www.yahoo.com/preview


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFBHC3gwZR2XMkZmQRAgrgAJ0bCXLAbXTmZ3fkA2wyC+BdFMNqMgCfcOWt
GlrtCMtOa6yAO1Iow4HK+g8=
=SQHw
-END PGP SIGNATURE-



Re: Tor Defense Fund...an idea.

2006-09-10 Thread Anothony Georgeo
glymr [EMAIL PROTECTED] wrote: An amusing subtext in this is that issue of social reward which came upin discussions about how to encourage tor servers to appear. I'minclined to suggest that a firehose blasting would work better, find aneffective way to get more people to run tor nodes, and it goes fromvictimisation to class action.Well, I know Roger, Nick, etc are against it but making Tor run as a server by default may be worth more consideration (I2P does this). Also, I've read posts about the possibility of offering better speed/etc to clients who also operate servers, this may be the best option.A class-action would be the best option but I believe it would be hard/impossible to make a class-action with operators in different countries due in part to how each country
 handles class-actions (or if they allow them at all). This would mean a class-action in Germany by German operators and a class-action in France by French operators, etc, etc. It may be more feasible to offer monetary help with legal defense and fines incurred to individual operators than try to launch class-actions in each country.Thoughts?Anogeorgeo 
		 All-new Yahoo! Mail - Fire up a more powerful email and get things done faster.

Re: Tor Defense Fund...an idea.

2006-09-10 Thread Andrew Del Vecchio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

There is some truth to this perhaps, but on the other hand, the more
people participating, the more statistically likely it is that more
people get 'busted', therefore draining the fund even more. Glymr, I
think you've got some good analysis here, but it needs to be tied into
a greater whole. Please see my other response to this topic about
real life privacy and asset protection methods to help prevent most
of such potential suits in the first place.

`Andrew

glymr wrote:
 An amusing subtext in this is that issue of social reward which
 came up in discussions about how to encourage tor servers to
 appear. I'm inclined to suggest that a firehose blasting would work
  better, find an effective way to get more people to run tor nodes,
  and it goes from victimisation to class action.

 Anothony Georgeo wrote:
 Hi,

 Tor server operators are more frequently subject to government
 action due to the fact they are running an exit or entry node.
 IMO this will cause some operators to shutdown their nodes to
 avoid legal repercussions and/or the monetary damages that can be
  incurred (from fines or legal defense).

 I propose a fund (eg. Tor Defense Fund) that would be available
  to server operators engaged in legal battles.  The TDF would be
 funded by donations from other Tor users, as it would be in their
 best interest to donate if they wish to keep the Tor network
 running well.

 Maybe the EFF would consider running the fund and paying out X
 amount of dollars to each operator who meets a certain criteria?

 Comments?

 Anogeorgeo


 
  Get your email and more, right on the new Yahoo.com
 http://us.rd.yahoo.com/evt=42973/*http://www.yahoo.com/preview




- --
Frivolous lawsuits. Unlawful government seizures. It's a scary world
out there!
Protect your privacy, keep what you earn, and even earn more income at:
http://www.KeepYourAssets.net/?andrew

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFBHH+gwZR2XMkZmQRAmPmAKC0c08BzH3pokMGYccxh9lGVQFnYACgvzzT
OkE/r1eGv8UD1usgQwJWFUY=
=zfIH
-END PGP SIGNATURE-



Re: Tor Defense Fund...an idea.

2006-09-10 Thread glymr
My point here, which seems to be lost on everyone, is that putting your
neck out is a monetary (at least requires monetary) contribution. As for
organising users together that is just a matter of good viral marketing.
Fast internet is starting to spread fast anyway, with all this ADSL2
popping up. I think perhaps that better would be to get people to sign
on for being part of the class action defense group as a part of running
a server. I'm sure this would bring a lot of the broader civil liberties
people into the fold.

Anothony Georgeo wrote:
 
 
 */glymr [EMAIL PROTECTED]/* wrote:
 
 An amusing subtext in this is that issue of social reward which came up
 in discussions about how to encourage tor servers to appear. I'm
 inclined to suggest that a firehose blasting would work better, find an
 effective way to get more people to run tor nodes, and it goes from
 victimisation to class action.
 
 Well, I know Roger, Nick, etc are against it but making Tor run as a
 server by default may be worth more consideration (I2P does this). 
 Also, I've read posts about the possibility of offering better speed/etc
 to clients who also operate servers, this may be the best option.
 
 A class-action would be the best option but I believe it would be
 hard/impossible to make a class-action with operators in different
 countries due in part to how each country handles class-actions (or if
 they allow them at all).  This would mean a class-action in Germany by
 German operators and a class-action in France by French operators, etc,
 etc.  It may be more feasible to offer monetary help with legal defense
 and fines incurred to individual operators than try to launch
 class-actions in each country.
 
 Thoughts?
 
 Anogeorgeo
 
 
 All-new Yahoo! Mail
 http://us.rd.yahoo.com/evt=43256/*http://advision.webevents.yahoo.com/mailbeta-
 Fire up a more powerful email and get things done faster.


Re: Updates

2006-09-10 Thread Anothony Georgeo
Arrakistor,

--- Arrakistor [EMAIL PROTECTED] wrote:

 Have we heard any response about the offer for a
 windows box on which
 to compile?
 
 Have we heard any response to a request for a win32
 version for the
 latest tor?
 
 
 Regards,
  Arrakistor
 

Quote by Phobos:
http://archives.seul.org/or/talk/Sep-2006/msg00108.html
---
I'm working towards building the official win32 
binaries going forward.  I'm hoping to have something 
together for 0.1.2.1-alpha by the weekend.  We'll see 
how it goes. 
---

It looks like Phobos is kind enough to do the official
Win32 builds for the community.

Anogeorgeo

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


Re: Updates

2006-09-10 Thread Alex V.
Or, if needed, I've an official Microsoft Visual Studio 2005 Beta 2 DVD
That I can send to someone that wants to do that under a REAL windows
environment.

Alex


On Dim 10 septembre 2006 22:30, Anothony Georgeo a écrit :
 Arrakistor,

 --- Arrakistor [EMAIL PROTECTED] wrote:

 Have we heard any response about the offer for a
 windows box on which
 to compile?

 Have we heard any response to a request for a win32
 version for the
 latest tor?


 Regards,
  Arrakistor


 Quote by Phobos:
 http://archives.seul.org/or/talk/Sep-2006/msg00108.html
 ---
 I'm working towards building the official win32
 binaries going forward.  I'm hoping to have something
 together for 0.1.2.1-alpha by the weekend.  We'll see
 how it goes.
 ---

 It looks like Phobos is kind enough to do the official
 Win32 builds for the community.

 Anogeorgeo

 __
 Do You Yahoo!?
 Tired of spam?  Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com





Re: Tor Defense Fund...an idea.

2006-09-10 Thread David Benfell
On Sun, 10 Sep 2006 13:42:39 -0700, Anothony Georgeo wrote:
 
 My original point is still vaild though, a
 class-action in multiple countries would be very
 difficult if not impossible.  Thus it seems it may be
 necessary to make a different class-action in each
 country due to each countries specific class-action
 requirments.
 
I am not a lawyer.  But I suspect this would not need to
be pursued in as many countries as I think you're thinking.

That it would need to be pursued in the United States is a
given.  I assume that the paranoia in Germany follows from
Bush administration propaganda.  Because Germany is making
these moves, it, too, is a given.  To this list, I would add
the United Kingdom.  Beyond that, I'm not sure how many other
countries would really be needed.

-- 
David Benfell, LCP
[EMAIL PROTECTED]
---
Resume available at http://www.parts-unknown.org/


Protecting exit-nodes by GeoIP based policy

2006-09-10 Thread Enrico Scholz
Hello,

I just had the idea which can help to protect exit-nodes against some
kinds of legal prosecution. Basically, it would be policy to Tor servers
which says do not connect into country XY. Such a rule does not increase
anonymity but would require that legal actions (e.g. confiscations) must
be performed in another country than this where the crime happened. This
is a much higher hurdle, especially for lower delinquencies.

I see two steps how this policy can be implemented:

A. On client side

 1. add a new option, e.g. 'Jurisdiction' with possible values of
* 'other'  ... when set, do not use an exit-node when it is the same
   jurisdiction as the target-ip; this should be the
   default on new installations
* 'same'   ... use an exit-node only, when it is in the same
   jurisdiction (just for completeness...)
* 'ignore' ... ignore jurisdiction (same behavior as now)
* a country code  ...  use only exit-nodes within this country; a
   negated format should exist too

 2. when choosing path, use only exit-nodes which are following the
constraint above


B. On (exit-)node side

 1. add a new option, e.g. 'JurisdictionPolicy' which accepts country
codes and perhaps special values like '%same'. Behavior is similar
to the client side option mentioned above

 2. Tor protocol/meta data must be changed to transmit this option

 3. node forbids connections which are violating the policy


The decision whether a node and a target are in the same jurisdiction can
be done e.g. by a GeoIP like service. A problem might be the license:
GeoIP is GPL, Tor is BSD. Dunno, whether the database can be used freely
and Tor has to implement own parsing routines. Perhaps, similar projects
exist.



Enrico


pgpsiUzNvGBkw.pgp
Description: PGP signature


Re: Tor Defense Fund...an idea.

2006-09-10 Thread Andrew Del Vecchio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

This may very well be true in general. However, consider these two
important aspects:

1. Government=force, and if you can get away with shutting up your
opponents AND stealing most of or everything they have, why not? For
them, it kills two birds with one stone, and as we all know, it's
nearly impossible to get any of it back after the fact. This factor is
important not exclusively for Tor people, but for political critics in
general.

2. More directly related to your analysis (which I believe is true as
a general principle), we must recall that in today's connected world,
the easiest way to get someone and take them down is to review their
many public and allegedly private records, such as bank transaction
information, utility bills, health forms (especially in more
socialized nation-states), etc. I don't pretend to argue that this
will instantly make you immune to the legal railroading that some
operators have experienced over the months, but it does make it quite
a bit more time consuming and expensive. After all, we're dealing with
incompetent, lazy bureaucrats here that would rather eat donuts than
bust people if it means having to do some actual work. They rely on
goading ISPs, banks, etc. into forking over information. This is an
even more acute risk in the US since the (un)PATRIOT Act passed.
Here's an example:

I have an 'invisible' LLC whose principle place of business is
registered as being in the Canary Islands. I organized it so that I
could get set up a wireless Internet account with a major US telcom. I
paid for it with an anonymous prepaid debit card. As a result, no one
knows where I live, nor do they have my SSN, as my LLC's EIN# was used
instead (also not connected to my personal info). You could use this
basic process for a variety of needs, but I used this one, as it's
germane to the basic problem at hand: How can we help legally protect
Tor router operators?.

~Andrew

- --
Frivolous lawsuits. Unlawful government seizures. It's a scary world
out there!
Protect your privacy, keep what you earn, and even earn more income at:
http://www.KeepYourAssets.net/?andrew


Anothony Georgeo wrote:
 --- Andrew Del Vecchio [EMAIL PROTECTED] wrote:

 The bottom line here is that if the self-proclaimed
 authorities can't find/don't know you own anything

 of value in the first place, they're much less
 likely
 to seek you out as the next great example to be
 held up and publically beaten to scare the public
 (metaphorically speaking).

 Well, in terms of the Tor network I believe the
 authorities concider the possibility of shutting down
 the network to be of utmost value.

 IMO the authorities in this case don't really care if
 an operator has anything of value as they seek to
 prevent their citizens from gaining anonymity.

 Anogeorgeo

 __
 Do You Yahoo!?
 Tired of spam?  Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com





-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFBKq9gwZR2XMkZmQRAmYzAKChSeyPL42Nfh+AF27+kgfjZMSNkgCfXC7Y
GSmJaJbURIpxdvhvNVYcnuw=
=LiGC
-END PGP SIGNATURE-



Re: bug / ISPs blocking ?

2006-09-10 Thread Andrew Del Vecchio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

This happens to me every so often, say about once per month. AFAIK,
this is normal and is a result of some dirservers going down before
the new polling data is distributed across the whole network (?)

Arrakistor wrote:
 Greetings,

 Does anyone know why I would be getting responses of:

 Sep 10 17:24:37.203 [notice] Tor 0.1.1.23 opening new log file. Sep
 10 17:24:37.515 [notice] I learned some more directory information,
 but not enough to build a circuit. Sep 10 17:24:39.343 [notice] I
 learned some more directory information, but not enough to build a
 circuit. Sep 10 17:24:41.906 [notice] I learned some more directory
 information, but not enough to build a circuit. Sep 10 17:24:42.281
 [notice] I learned some more directory information, but not enough
 to build a circuit. Sep 10 17:24:42.640 [notice] We now have enough
 directory information to build circuits.

 Yet, no circuit is ever built? I have come across this, it is
 always like that on my network now, and some other users have
 reported it as well. I've tried it on other machines on my network
 and I have the same problem.

 Is this a case of the ISP blocking connection to tor? What could be
  causing this?

 Regards, Arrakistor





- --
Frivolous lawsuits. Unlawful government seizures. It's a scary world
out there!
Protect your privacy, keep what you earn, and even earn more income at:
http://www.KeepYourAssets.net/?andrew

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFBL1lgwZR2XMkZmQRAo7QAJ9IjCV2q1HAK/BajJKgAAmD3vWpowCggJ7d
fL4tAyOpjQjoxc/41O2smsI=
=1yRe
-END PGP SIGNATURE-


Re: Tor Defense Fund...an idea.

2006-09-10 Thread Paul Syverson
On Sun, Sep 10, 2006 at 06:34:45PM -0700, Andrew Del Vecchio wrote:
 
 Tor was originally supported by the US Navy, but that is no longer the
 case for whatever reason.

Tor, as with the previous generations of Onion Routing, was designed
by myself and others from NRL. It's the first system that was partly
rather than entirely done by NRL personnel, Roger and Nick were under
contract to NRL for design, development and initial deployment of Tor.

Funding for related research is ongoing, e.g., for analysis and
improvement of hidden services (which led to improved security for all
Tor circuit building cf.
http://www.onion-router.net/Publications.html#locating-hidden-servers)
Development and maintenance per se of Tor has passed beyond being
a research project; that aspect is no longer an NRL project.

You might want to look at
http://www.onion-router.net/ in general, and
http://www.onion-router.net/Sponsors.html   in particular.

Funding from EFF for Tor development ended about a year ago, though
they still provide the web site and support in other indirect ways. So
the sponsors page is a little dated in that respect.

HTH,
Paul
-- 
Paul Syverson  ()  ascii ribbon campaign  
Contact info at http://www.syverson.org/   /\  against html e-mail


Re: Tor Defense Fund...an idea.

2006-09-10 Thread Andrew Del Vecchio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Was anyone on the original project full-on Navy, or was this entirely
contracted out?

Paul Syverson wrote:
 On Sun, Sep 10, 2006 at 06:34:45PM -0700, Andrew Del Vecchio wrote:

 Tor was originally supported by the US Navy, but that is no
 longer the case for whatever reason.

 Tor, as with the previous generations of Onion Routing, was
 designed by myself and others from NRL. It's the first system that
 was partly rather than entirely done by NRL personnel, Roger and
 Nick were under contract to NRL for design, development and initial
 deployment of Tor.

 Funding for related research is ongoing, e.g., for analysis and
 improvement of hidden services (which led to improved security for
 all Tor circuit building cf.
 http://www.onion-router.net/Publications.html#locating-hidden-servers)
  Development and maintenance per se of Tor has passed beyond being
 a research project; that aspect is no longer an NRL project.

 You might want to look at http://www.onion-router.net/ in
 general, and http://www.onion-router.net/Sponsors.html   in
 particular.

 Funding from EFF for Tor development ended about a year ago, though
  they still provide the web site and support in other indirect
 ways. So the sponsors page is a little dated in that respect.

 HTH, Paul

- --
Frivolous lawsuits. Unlawful government seizures. It's a scary world
out there!
Protect your privacy, keep what you earn, and even earn more income at:
http://www.KeepYourAssets.net/?andrew

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFBNhtgwZR2XMkZmQRAjnKAJ9tozHUdUzf/bj4yJsYM+R35+Q4cwCgoQXG
uceNg3gTAk29fE9WCms=
=QGSL
-END PGP SIGNATURE-



torrc Clientonly

2006-09-10 Thread Arrakistor
I would like some clarification regarding the Clientonly setting.
Does this explicitly mean you do not participate in any circuits, or
that you are not running as an entrance/exit node but may still run
mitm.

Regards,
 Arrakistor



Re: Tor Defense Fund...an idea.

2006-09-10 Thread Paul Syverson
On Sun, Sep 10, 2006 at 08:30:54PM -0700, Andrew Del Vecchio wrote:

 Was anyone on the original project full-on Navy, or was this entirely
 contracted out?

I'm not sure I understand the question. Onion Routing was originally
invented and developed entirely by civilian (non-uniformed) employees
of NRL (not contractors).  So, if that counts as full-on Navy, then
yes.  As I said before, Roger and Nick were contractors when the three
of us devised Tor together. Beyond that I think I already covered.

aloha,
Paul




unsubscribe

2006-09-10 Thread Laurel Fitzhugh